Towards the Dynamic Provision of Virtualized Security Services
Network operators face several limitations in terms of infrastructure management and costs when trying to offer security services to a large number of customers with current technologies. Network Functions Virtualization and Software-Defined Networks paradigms try to overcome these limitations by allowing more flexibility, configurability and agility. Unfortunately, the problem of deciding which security services to use, where to place and how to configure them is a multi-dimensional problem that has no easy solution. This paper provides a model that can be used to determine the best allocation for the security applications needed to satisfy the user requirements while minimizing the cost for the network operator, subject to the different constraints expressed by the involved actors. This model can be exploited to pursue an initial dimensioning and set-up of the system infrastructure or to dynamically adapt it to support the user security policies. Initial validation shows that allocations generated with our model have considerable advantages in terms of costs and performance compared to traditional approaches.
KeywordsPolicy Implementation Security Service Internet Service Provider Edge Node Security Application
The research described in this paper is part of the SECURED project, co-funded by the European Commission (FP7 grant agreement no. 611458).
- 1.The european telecommunications standards institute: network function virtualization - white paper 2. Technical report, October 2013Google Scholar
- 4.Basile, C., Lioy, A., Pitscheider, C., Valenza, F., Vallini, M.: A novel approach for integrating security policy enforcement with dynamic network virtualization. In: NetSoft 2015: 1st IEEE Conference on Network Softwarization, London, UK, April 2014Google Scholar
- 6.Moens, H., De Turck, F.: VNF-P: a model for efficient placement of virtualized network functions. In: CNSM 2014: 10th International Conference on Network and Service Management, pp. 418–423, November 2014Google Scholar
- 7.Yoshida, M., Shen, W., Kawabata, T., Minato, K., Imajuku, W.: MORSA: a multi-objective resource scheduling algorithm for NFV infrastructure. In: APNOMS 2014: 16th Asia-Pacific Network Operations and Management Symposium, pp. 1–6, September 2014Google Scholar
- 8.Clayman, S., Maini, E., Galis, A., Manzalini, A., Mazzocca, N.: The dynamic placement of virtual network functions. In: NOMS 2014: Network Operations and Management Symposium, pp. 1–9, May 2014Google Scholar
- 9.Beloglazov, A., Buyya, R.: Energy efficient allocation of virtual machines in cloud data centers. In: CCGrid 2010: 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp. 577–578, May 2010Google Scholar
- 11.Gember, A., Krishnamurthy, A., John, S.S., Grandl, R., Gao, X., Anand, A., Benson, T., Akella, A., Sekar, V.: Stratos: a network-aware orchestration layer for middleboxes in the cloud. CoRR abs/1305.0209, June 2013Google Scholar
- 12.Meng, X., Pappas, V., Zhang, L.: Improving the scalability of data center networks with traffic-aware virtual machine placement. In: INFOCOM 2010, San Diego, CA, pp. 1–9, March 2010Google Scholar
- 13.Mehraghdam, S., Keller, M., Karl, H.: Specifying and placing chains of virtual network functions. In: CloudNet 2014: IEEE 3rd International Conference on Cloud Networking, Luxembourg, pp. 7–13, October 2014Google Scholar