An evaluation of a virtual network function for real-time threat detection using stream processing

@article{Lopez2018AnEO,
  title={An evaluation of a virtual network function for real-time threat detection using stream processing},
  author={M. A. Lopez and A. Lobato and O. Duarte and G. Pujolle},
  journal={2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)},
  year={2018},
  pages={1-5}
}
  • M. A. Lopez, A. Lobato, +1 author G. Pujolle
  • Published 2018
  • Computer Science
  • 2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)
Network Function Virtualization (NFV) provides new opportunities for efficient and low-cost security solutions. Real-time traffic monitoring and fast security threat detection is a challenge to reduce the risk of great damages. In this paper, we propose a virtualized network function in an Open Source Platform for providing a real-time threat detection service. Our function combines cloud computing and distributed stream processing techniques to accurately and quickly detect threats. The… Expand
Detecting cloud virtual network isolation security for data leakage
Securing Industrial Wireless Networks: Enhancing SDN with PhySec
Improving threat detection in networks using deep learning
Industrial Grade Methodology for Firewall Simulation and Requirements Verification

References

SHOWING 1-10 OF 15 REFERENCES
A survey on security in network functions virtualization
  • Wei Yang, Carol J. Fung
  • Computer Science
  • 2016 IEEE NetSoft Conference and Workshops (NetSoft)
  • 2016
VGuard: A distributed denial of service attack mitigation method using network function virtualization
An elastic intrusion detection system for software networks
A Performance Comparison of Open-Source Stream Processing Platforms
Network Function Virtualization: State-of-the-Art and Research Challenges
Orchestrating Virtualized Network Functions
Securing virtual execution environments through machine learning-based intrusion detection
CloudMon: a resource‐efficient IaaS cloud monitoring system based on networked intrusion detection system virtual appliances
Use of machine learning in big data analytics for insider threat detection
...
1
2
...