skip to content
Guide to security in SDN and NFV : challenges, opportunities, and applications Preview this item
ClosePreview this item
Checking...

Guide to security in SDN and NFV : challenges, opportunities, and applications

Author: Shao Ying Zhu; Sandra Scott-Hayward; Ludovic Jacquin; Richard Hill
Publisher: Cham : Springer International Publishing, 2017.
Series: Computer communications and networks.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Network Functions Virtualization (NFV), together referred to as SDNFV. Presenting a comprehensive guide to the application of security mechanisms in the context of SDNFV, the content spans fundamental theory, practical solutions, and potential applications in future  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Zhu, Shao Ying.
Guide to Security in SDN and NFV : Challenges, Opportunities, and Applications.
Cham : Springer International Publishing, ©2017
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Shao Ying Zhu; Sandra Scott-Hayward; Ludovic Jacquin; Richard Hill
ISBN: 9783319646534 3319646532
OCLC Number: 1012347646
Notes: ""3.3 A Survey of Proposals to Secure SDN/NFV Platforms""
Description: 1 online resource (342 pages)
Contents: ""Foreword""; ""Preface""; ""Acknowledgement""; ""Contents""; ""Contributors""; ""About the Editors""; ""Part I Introduction to Security in SDNFV â#x80;#x93; Key Concepts""; ""1 Security of Software-Defined Infrastructures with SDN, NFV, and Cloud Computing Technologies""; ""1.1 Introduction""; ""1.2 Defining Characteristics of Software-Defined Networking, Network Functions Virtualization, and Cloud Computing""; ""1.2.1 Software-Defined Networking""; ""1.2.2 Network Functions Virtualization""; ""1.2.3 Cloud Computing""; ""1.2.4 Virtualization""; ""1.3 Security Challenges of NFV, SDN, and Cloud"" ""1.3.1 General Security Requirements and Definitions""""1.3.2 NFV Security Challenges""; ""1.3.3 SDN Security Challenges""; ""1.3.4 Cloud Security Challenges""; ""1.4 Security Challenges and Solutions for Cloud-SDN-NFV Integrated Software Infrastructure""; ""1.4.1 Security of Virtualization""; ""1.4.1.1 Fundamental Security Issues with Virtualization""; ""1.4.1.2 Solutions and Guidance""; ""1.4.2 Security by Isolation""; ""1.4.2.1 Isolation Classification""; ""1.4.2.2 Standard Network Security Solutions by Isolation""; ""1.4.3 Security of Identity and Access Management"" ""1.5 Case Study: Security of OpenStack Platform""""1.5.1 Security Challenges and Threats in OpenStack""; ""1.5.2 OpenStack Security Solution Recommendation""; ""1.6 Integrated Software-Defined Infrastructure Security""; ""1.6.1 SDSec Concept""; ""1.6.2 Software-Defined Security Service (SDS2) Architecture""; ""1.6.2.1 SDS2 Controller""; ""1.6.2.2 SDS2 Northbound Interface (NBI)""; ""1.6.2.3 SDS2 Virtual Security Function""; ""1.6.2.4 SDS2 Southbound Interface (SBI)""; ""1.6.2.5 Application of SDS2 to Data Center Security""; ""1.7 Summary""; ""1.8 Questions""; ""References"" ""2 NFV Security: Emerging Technologies and Standards""""2.1 Introduction""; ""2.2 Threats and Opportunities""; ""2.3 The Problems Identified in the ETSI NFV Security Problem Statement""; ""2.3.1 Topology Validation and Enforcement""; ""2.3.2 Availability of Management Support Infrastructure""; ""2.3.3 Secured Boot""; ""2.3.4 Secure Crash""; ""2.3.5 Performance Isolation""; ""2.3.6 User/Tenant Authentication, Authorization, and Accounting (AAA)""; ""2.3.7 Authenticated Time Service""; ""2.3.8 Private Keys within Cloned Images"" ""2.3.9 Backdoors via Virtualized Test and Monitoring Functions""""2.3.10 Multi-administrator Isolation""; ""2.4 Establishing and Maintaining Trust""; ""2.5 Lawful Interception and the Environment for the Execution of Sensitive Components""; ""2.6 Security Management and Monitoring""; ""2.7 Analysis of the OpenStack Security""; ""2.8 Conclusion""; ""2.9 Review Questions""; ""References""; ""3 SDN and NFV Security: Challenges for Integrated Solutions""; ""3.1 Introduction""; ""3.2 SDN and NFV Integration""; ""3.2.1 An Integrated Architecture""; ""3.2.2 Orchestration and Management in SDN/NFV""
Series Title: Computer communications and networks.
Responsibility: Shao Ying Zhu, Sandra Scott-Hayward, Ludovic Jacquin, Richard Hill, editors.

Abstract:

This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Network Functions Virtualization (NFV), together  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1012347646> # Guide to security in SDN and NFV : challenges, opportunities, and applications
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
    library:oclcnum "1012347646" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/4407391126#Place/cham> ; # Cham
    schema:about <http://dewey.info/class/004.6/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/4407391126#Topic/computers_reference> ; # COMPUTERS--Reference
    schema:about <http://experiment.worldcat.org/entity/work/data/4407391126#Topic/computers_machine_theory> ; # COMPUTERS--Machine Theory
    schema:about <http://experiment.worldcat.org/entity/work/data/4407391126#Topic/software_defined_networking_computer_network_technology> ; # Software-defined networking (Computer network technology)
    schema:about <http://experiment.worldcat.org/entity/work/data/4407391126#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:about <http://dewey.info/class/004/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/4407391126#Topic/computers_hardware_general> ; # COMPUTERS--Hardware--General
    schema:about <http://experiment.worldcat.org/entity/work/data/4407391126#Topic/computers_information_technology> ; # COMPUTERS--Information Technology
    schema:about <http://experiment.worldcat.org/entity/work/data/4407391126#Topic/computers_data_processing> ; # COMPUTERS--Data Processing
    schema:about <http://experiment.worldcat.org/entity/work/data/4407391126#Topic/computers_computer_science> ; # COMPUTERS--Computer Science
    schema:about <http://experiment.worldcat.org/entity/work/data/4407391126#Topic/computers_computer_literacy> ; # COMPUTERS--Computer Literacy
    schema:bookFormat schema:EBook ;
    schema:contributor <http://experiment.worldcat.org/entity/work/data/4407391126#Person/hill_richard> ; # Richard Hill
    schema:contributor <http://experiment.worldcat.org/entity/work/data/4407391126#Person/jacquin_ludovic> ; # Ludovic Jacquin
    schema:contributor <http://experiment.worldcat.org/entity/work/data/4407391126#Person/scott_hayward_sandra> ; # Sandra Scott-Hayward
    schema:contributor <http://experiment.worldcat.org/entity/work/data/4407391126#Person/zhu_shao_ying> ; # Shao Ying Zhu
    schema:datePublished "2017" ;
    schema:description "This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Network Functions Virtualization (NFV), together referred to as SDNFV. Presenting a comprehensive guide to the application of security mechanisms in the context of SDNFV, the content spans fundamental theory, practical solutions, and potential applications in future networks. Topics and features: Introduces the key security challenges of SDN, NFV and Cloud Computing, providing a detailed tutorial on NFV security Discusses the issue of trust in SDN/NFV environments, covering roots of trust services, and proposing a technique to evaluate trust by exploiting remote attestation Reviews a range of specific SDNFV security solutions, including a DDoS detection and remediation framework, and a security policy transition framework for SDN Describes the implementation of a virtual home gateway, and a project that combines dynamic security monitoring with big-data analytics to detect network-wide threats Examines the security implications of SDNFV in evolving and future networks, from network-based threats to Industry 4.0 machines, to the security requirements for 5G Investigates security in the Observe, Orient, Decide and Act (OODA) paradigm, and proposes a monitoring solution for a Named Data Networking (NDN) architecture Includes review questions in each chapter, to test the reader's understanding of each of the key concepts described This informative and practical volume is an essential resource for researchers interested in the potential of SDNFV systems to address a broad range of network security challenges. The work will also be of great benefit to practitioners wishing to design secure next-generation communication networks, or to develop new security-related mechanisms for SDNFV systems. Dr. Shao Ying Zhu is a Senior Lecturer in Computing at the University of Derby, UK. Dr. Sandra Scott-Hayward is a Lecturer (Assistant Professor) at Queen's University Belfast, Northern Ireland. Dr. Ludovic Jacquin is a Senior Researcher at Hewlett Packard Labs - the research organisation of Hewlett Packard Enterprise - in Bristol, UK. Prof. Richard Hill is the Head of the Department of Informatics and the Director of the Centre for Industrial Analytics at the University of Huddersfield, UK. The other publications of the editors include the Springer titles Guide to Security Assurance for Cloud Computing and Big-Data Analytics and Cloud Computing: Theory, Algorithms and Applications."@en ;
    schema:description """Foreword""; ""Preface""; ""Acknowledgement""; ""Contents""; ""Contributors""; ""About the Editors""; ""Part I Introduction to Security in SDNFV â#x80;#x93; Key Concepts""; ""1 Security of Software-Defined Infrastructures with SDN, NFV, and Cloud Computing Technologies""; ""1.1 Introduction""; ""1.2 Defining Characteristics of Software-Defined Networking, Network Functions Virtualization, and Cloud Computing""; ""1.2.1 Software-Defined Networking""; ""1.2.2 Network Functions Virtualization""; ""1.2.3 Cloud Computing""; ""1.2.4 Virtualization""; ""1.3 Security Challenges of NFV, SDN, and Cloud"""@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/4407391126> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/4407391126#Series/computer_communications_and_networks> ; # Computer communications and networks.
    schema:isSimilarTo <http://worldcat.org/entity/work/data/4407391126#CreativeWork/guide_to_security_in_sdn_and_nfv_challenges_opportunities_and_applications> ;
    schema:name "Guide to security in SDN and NFV : challenges, opportunities, and applications"@en ;
    schema:productID "1012347646" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/1012347646#PublicationEvent/cham_springer_international_publishing_2017> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/4407391126#Agent/springer_international_publishing> ; # Springer International Publishing
    schema:url <https://doi.org/10.1007/978-3-319-64653-4> ;
    schema:url <http://link.springer.com/10.1007/978-3-319-64653-4> ;
    schema:url <http://rave.ohiolink.edu/ebooks/ebc/9783319646534> ;
    schema:url <https://0-link-springer-com.pugwash.lib.warwick.ac.uk/10.1007/978-3-319-64653-4> ;
    schema:url <http://VH7QX3XE2P.search.serialssolutions.com/?V=1.0&L=VH7QX3XE2P&S=AC_T_B&C=Guide%20to%20Security%20in%20SDN%20and%20NFV&T=marc&tab=BOOKS> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=5144516> ;
    schema:url <https://0-link-springer-com.pugwash.lib.warwick.ac.uk/book/10.1007/978-3-319-64653-4> ;
    schema:url <https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1636638> ;
    schema:url <http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=5144516> ;
    schema:url <http://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783319646534> ;
    schema:workExample <http://dx.doi.org/10.1007/978-3-319-64653-4> ;
    schema:workExample <http://worldcat.org/isbn/9783319646534> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1012347646> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/4407391126#Agent/springer_international_publishing> # Springer International Publishing
    a bgn:Agent ;
    schema:name "Springer International Publishing" ;
    .

<http://experiment.worldcat.org/entity/work/data/4407391126#Person/hill_richard> # Richard Hill
    a schema:Person ;
    schema:familyName "Hill" ;
    schema:givenName "Richard" ;
    schema:name "Richard Hill" ;
    .

<http://experiment.worldcat.org/entity/work/data/4407391126#Person/jacquin_ludovic> # Ludovic Jacquin
    a schema:Person ;
    schema:familyName "Jacquin" ;
    schema:givenName "Ludovic" ;
    schema:name "Ludovic Jacquin" ;
    .

<http://experiment.worldcat.org/entity/work/data/4407391126#Person/scott_hayward_sandra> # Sandra Scott-Hayward
    a schema:Person ;
    schema:familyName "Scott-Hayward" ;
    schema:givenName "Sandra" ;
    schema:name "Sandra Scott-Hayward" ;
    .

<http://experiment.worldcat.org/entity/work/data/4407391126#Person/zhu_shao_ying> # Shao Ying Zhu
    a schema:Person ;
    schema:familyName "Zhu" ;
    schema:givenName "Shao Ying" ;
    schema:name "Shao Ying Zhu" ;
    .

<http://experiment.worldcat.org/entity/work/data/4407391126#Series/computer_communications_and_networks> # Computer communications and networks.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/1012347646> ; # Guide to security in SDN and NFV : challenges, opportunities, and applications
    schema:name "Computer communications and networks." ;
    schema:name "Computer Communications and Networks" ;
    .

<http://experiment.worldcat.org/entity/work/data/4407391126#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4407391126#Topic/computers_computer_literacy> # COMPUTERS--Computer Literacy
    a schema:Intangible ;
    schema:name "COMPUTERS--Computer Literacy"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4407391126#Topic/computers_computer_science> # COMPUTERS--Computer Science
    a schema:Intangible ;
    schema:name "COMPUTERS--Computer Science"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4407391126#Topic/computers_data_processing> # COMPUTERS--Data Processing
    a schema:Intangible ;
    schema:name "COMPUTERS--Data Processing"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4407391126#Topic/computers_hardware_general> # COMPUTERS--Hardware--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Hardware--General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4407391126#Topic/computers_information_technology> # COMPUTERS--Information Technology
    a schema:Intangible ;
    schema:name "COMPUTERS--Information Technology"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4407391126#Topic/computers_machine_theory> # COMPUTERS--Machine Theory
    a schema:Intangible ;
    schema:name "COMPUTERS--Machine Theory"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4407391126#Topic/computers_reference> # COMPUTERS--Reference
    a schema:Intangible ;
    schema:name "COMPUTERS--Reference"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4407391126#Topic/software_defined_networking_computer_network_technology> # Software-defined networking (Computer network technology)
    a schema:Intangible ;
    schema:name "Software-defined networking (Computer network technology)"@en ;
    .

<http://worldcat.org/entity/work/data/4407391126#CreativeWork/guide_to_security_in_sdn_and_nfv_challenges_opportunities_and_applications>
    a schema:CreativeWork ;
    rdfs:label "Guide to Security in SDN and NFV : Challenges, Opportunities, and Applications." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/1012347646> ; # Guide to security in SDN and NFV : challenges, opportunities, and applications
    .

<http://worldcat.org/isbn/9783319646534>
    a schema:ProductModel ;
    schema:isbn "3319646532" ;
    schema:isbn "9783319646534" ;
    .

<http://www.worldcat.org/title/-/oclc/1012347646>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/1012347646> ; # Guide to security in SDN and NFV : challenges, opportunities, and applications
    schema:dateModified "2019-06-27" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.