Development of Network Security Models in the Software-defined Infrastructure of Virtual Data Center

被引:0
作者
Bolodurina, Irina P. [1 ]
Parfenov, Denis I. [2 ]
机构
[1] Orenburg State Univ, Dept Appl Math, Orenburg, Russia
[2] Orenburg State Univ, Fac Distance Learning Technol, Orenburg, Russia
来源
PROCEEDINGS OF THE 2018 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS) | 2018年
基金
俄罗斯基础研究基金会;
关键词
multi-cloud platforms; software-defined networks; software-defined infrastructure; virtual data center; virtual network functions;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The novelty of the research is the combination of technologies of software-defined networks and virtualization of network functions for optimization network organization in virtual data centers. We was prepared approaches for solving tasks for describing firewall rules and the rules for selecting nodes of the physical infrastructure for the placement of security networks elements with using neural network and Data Mining methods. Our solutions will provide the required level of security and maintain a specified quality of service for applications and services of multi-cloud platforms. This approach was combined with efficient means for processing Big Data flows. It allows predicting infrastructure behavior over time and warning of possible failures, security threats and cyber attacks. The uniqueness our technology is that resource management that provides security and quality of service is carried out autonomously, using the principles of self-organization, without interference from administrators and third parties.
引用
收藏
页码:16 / 20
页数:5
相关论文
共 12 条
  • [1] [Anonymous], P 2016 ONL INT C GRE
  • [2] [Anonymous], PROCEDIA COMPUTER SC
  • [3] [Anonymous], P 2016 IEEE E W DES
  • [4] [Anonymous], P 2014 7 INT S RES C
  • [5] [Anonymous], 2017, INT SIB C CONTR COMM, DOI DOI 10.1109/SIBCON.2017.7998475
  • [6] Bakker J. N., 2016, P 2016 IEEE C NETWOR, P1
  • [7] An Optimal Use of Intrusion Detection and Prevention System (IDPS)
    Kashif, Mhair
    Zahoor-ul-Haq
    [J]. 2015 European Intelligence and Security Informatics Conference (EISIC), 2015, : 190 - 190
  • [8] Kumar A, 2016, 2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), P168, DOI 10.1109/CSITSS.2016.7779417
  • [9] Firewall Fingerprinting and Denial of Firewalling Attacks
    Liu, Alex X.
    Khakpour, Amir R.
    Hulst, Joshua W.
    Ge, Zihui
    Pei, Dan
    Wang, Jia
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (07) : 1699 - 1712
  • [10] Lombardo A., 2015, P 2015 1 IEEE C NETW, P1