Skip to main content

Security In Network Functions Virtualization

In Order to Read Online or Download Security In Network Functions Virtualization Full eBooks in PDF, EPUB, Tuebl and Mobi you need to create a Free account. Get any books you like and read everywhere you want. Fast Download Speed ~ Commercial & Ad Free. We cannot guarantee that every book is in the library!

Security in Network Functions Virtualization

Security in Network Functions Virtualization Book
Author : Zonghua Zhang,Ahmed Meddahi
Publisher : Elsevier
Release : 2017-11-20
ISBN : 0081023715
Language : En, Es, Fr & De

GET BOOK

Book Description :

The software and networking industry is experiencing a rapid development and deployment of Network Functions Visualization (NFV) technology, in both enterprise and cloud data center networks. One of the primary reasons for this technological trend is that NFV has the capability to reduce CAPEX and OPEX, whilst increasing networking service efficiency, performance, agility, scalability, and resource utilization. Despite such well-recognized benefits, security remains a major concern of network service providers and seriously impedes the further expansion of NFV. This book is therefore dedicated to investigating and exploring the potential security issues of NFV. It contains three major elements: a thorough overview of the NFV framework and architecture, a comprehensive threat analysis aiming to establish a layer-specific threat taxonomy for NFV enabled networking services, and a series of comparative studies of security best practices in traditional networking scenarios and in NFV, ultimately leading to a set of recommendations on security countermeasures in NFV. This book is primarily intended for engineers, engineering students and researchers and those with an interest in the field of networks and telecommunications (architectures, protocols, services) in general, and particularly software-defined network (SDN) and network functions virtualization (NFV)-based security services. Extensively studies security issues in NFV Presents a basis or guideline for both academia researchers and industry practitioners to work together to achieve secure and dependable lifecycle management of NFV based network services

Network Functions Virtualization NFV with a Touch of SDN

Network Functions Virtualization  NFV  with a Touch of SDN Book
Author : Rajendra Chayapathi,Syed F. Hassan,Paresh Shah
Publisher : Addison-Wesley Professional
Release : 2016-11-14
ISBN : 0134464338
Language : En, Es, Fr & De

GET BOOK

Book Description :

Network Functions Virtualization (NFV) will drive dramatic cost reductions while also accelerating service delivery. Using NFV with SDN, network owners can provision new functions rapidly on demand, improve scalability, and leverage microservices. Benefits like these will make NFV indispensable for service providers, mobile operators, telcos, and enterprises alike. Network Functions Virtualization (NFV) with a Touch of SDN is the first practical introduction to NFV’s fundamental concepts, techniques, and use cases. Written for wide audiences of network engineers, architects, planners, and operators, it assumes no previous knowledge of NFV architecture, deployment, or management. The authors first explain how virtualization, VMs, containers, and related technologies establish the foundation for the NFV transformation. Next, they show how these concepts and technologies can be applied to virtualize network functions in the cloud, data centers, routing, security, and the mobile packet core. You’ll discover new tools and techniques for managing and orchestrating virtualized network devices, and gain new clarity on how SDN and NFV interact and interrelate. By the time you’re done, you’ll be ready to assess vendor claims, evaluate architectures, and plan NFV’s role in your own networks. Understand NFV’s key benefits and market drivers Review how virtualization makes NFV possible Consider key issues associated with NFV network design and deployment Integrate NFV into existing network designs Orchestrate, build, and deploy NFV networks and cloud services Maximize operational efficiency by building more programmable, automated networks Understand how NFV and SDN work together Address security, programmability, performance, and service function chaining Preview evolving concepts that will shape NFV’s future

SDN and NFV Security

SDN and NFV Security Book
Author : Rahamatullah Khondoker
Publisher : Springer
Release : 2018-01-29
ISBN : 3319717618
Language : En, Es, Fr & De

GET BOOK

Book Description :

This book provides security analyses of several Software Defined Networking (SDN) and Network Functions Virtualization (NFV) applications using Microsoft’s threat modeling framework STRIDE. Before deploying new technologies in the production environment, their security aspects must be considered. Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are two new technologies used to increase e.g. the manageability, security and flexibility of enterprise/production/cloud IT environments. Also featuring a wealth of diagrams to help illustrate the concepts discussed, the book is ideally suited as a guide for all IT security professionals, engineers, and researchers who need IT security recommendations on deploying SDN and NFV technologies.

Innovations in Software Defined Networking and Network Functions Virtualization

Innovations in Software Defined Networking and Network Functions Virtualization Book
Author : Dumka, Ankur
Publisher : IGI Global
Release : 2018-02-16
ISBN : 1522536418
Language : En, Es, Fr & De

GET BOOK

Book Description :

The advancement of technology is a standard of modern daily life, whether it be the release of a new cellphone, computer, or a self-driving car. Due to this constant advancement, the networks on which these technologies operate must advance as well. Innovations in Software-Defined Networking and Network Functions Virtualization is a critical scholarly publication that observes the advances made in network infrastructure through achieving cost efficacy while maintaining maximum flexibility for the formation and operation of these networks. Featuring coverage on a broad selection of topics, such as software-defined storage, openflow controller, and storage virtualization, this publication is geared toward professionals, computer engineers, academicians, students, and researchers seeking current and relevant research on the advancements made to network infrastructures.

SDN and NFV Simplified

SDN and NFV Simplified Book
Author : Jim Doherty
Publisher : Addison-Wesley Professional
Release : 2016-02-24
ISBN : 0134307372
Language : En, Es, Fr & De

GET BOOK

Book Description :

A Visual Guide to Understanding Software Defined Networks and Network Function Virtualization The simple, visual, at-a-glance guide to SDN and NFV: Core concepts, business drivers, key technologies, and more! SDN (Software Defined Networks) and NFV (Network Function Virtualization) are today’s hottest areas of networking. Many executives, investors, sales professionals, and marketers need a solid working understanding of these technologies, but most books on the subject are written specifically for network engineers and other technical experts. SDN and NFV Simplified fills that gap, offering highly visual, “at-a-glance” explanations of SDN, NFV, and their underlying virtualizations. Built around an illustrated, story-telling approach, this answers the questions: Why does this technology matter? How does it work? Where is it used? What problems does it solve? Through easy, whiteboard-style infographics, you’ll learn: how virtualization enables SDN and NFV; how datacenters are virtualized through clouds; how networks can also be virtualized; and how to maximize security, visibility, and Quality of Experience in tomorrow’s fully-virtualized environments. Step by step, you’ll discover why SDN and NFV technologies are completely redefining both enterprise and carrier networks, and driving the most dramatic technology migration since IP networking. That’s not all: You’ll learn all you need to help lead this transformation. Learn how virtualization establishes the foundation for SDN and NFV Review the benefits of VMs, the role of hypervisors, and the management of virtual resources Discover how cloud technologies enable datacenter virtualization Understand the roles of networking gear in virtualized datacenters See VMWare VMotion and VXLAN at work in the virtualized datacenter Understand multitenancy and the challenges of “communal living” Learn how core network functions and appliances can be virtualized Ensure performance and scalability in virtualized networks Compare modern approaches to network virtualization, including OpenFlow, VMWare Nicera, Cisco Inseieme, and OpenStack Walk through the business case for SDN, NFV, and the Cloud Discover how the Software Defined Network (SDN) solves problems previously left unaddressed Understand SDN controllers–and who’s fighting to control your network Use SDN and NFV to improve integration and say goodbye to “truck rolls” Enforce security, avoid data leakage, and protect assets through encryption Provide for effective monitoring and consistent Quality of Experience (QoE) Learn how SDN and NFV will affect you–and what’s next

SDN NFV 19

SDN NFV 19 Book
Author : Anonim
Publisher : Unknown
Release : 2019
ISBN : 0987650XXX
Language : En, Es, Fr & De

GET BOOK

Book Description :

Download SDN NFV 19 book written by , available in PDF, EPUB, and Kindle, or read full book online anywhere and anytime. Compatible with any devices.

Guide to Security in SDN and NFV

Guide to Security in SDN and NFV Book
Author : Shao Ying Zhu,Sandra Scott-Hayward,Ludovic Jacquin,Richard Hill
Publisher : Springer
Release : 2017-11-10
ISBN : 3319646532
Language : En, Es, Fr & De

GET BOOK

Book Description :

This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Network Functions Virtualization (NFV), together referred to as SDNFV. Presenting a comprehensive guide to the application of security mechanisms in the context of SDNFV, the content spans fundamental theory, practical solutions, and potential applications in future networks. Topics and features: introduces the key security challenges of SDN, NFV and Cloud Computing, providing a detailed tutorial on NFV security; discusses the issue of trust in SDN/NFV environments, covering roots of trust services, and proposing a technique to evaluate trust by exploiting remote attestation; reviews a range of specific SDNFV security solutions, including a DDoS detection and remediation framework, and a security policy transition framework for SDN; describes the implementation of a virtual home gateway, and a project that combines dynamic security monitoring with big-data analytics to detect network-wide threats; examines the security implications of SDNFV in evolving and future networks, from network-based threats to Industry 4.0 machines, to the security requirements for 5G; investigates security in the Observe, Orient, Decide and Act (OODA) paradigm, and proposes a monitoring solution for a Named Data Networking (NDN) architecture; includes review questions in each chapter, to test the reader’s understanding of each of the key concepts described. This informative and practical volume is an essential resource for researchers interested in the potential of SDNFV systems to address a broad range of network security challenges. The work will also be of great benefit to practitioners wishing to design secure next-generation communication networks, or to develop new security-related mechanisms for SDNFV systems.

Foundations of Modern Networking

Foundations of Modern Networking Book
Author : William Stallings
Publisher : Addison-Wesley Professional
Release : 2015-10-27
ISBN : 0134176022
Language : En, Es, Fr & De

GET BOOK

Book Description :

Foundations of Modern Networking is a comprehensive, unified survey of modern networking technology and applications for today’s professionals, managers, and students. Dr. William Stallings offers clear and well-organized coverage of five key technologies that are transforming networks: Software-Defined Networks (SDN), Network Functions Virtualization (NFV), Quality of Experience (QoE), the Internet of Things (IoT), and cloudbased services. Dr. Stallings reviews current network ecosystems and the challenges they face–from Big Data and mobility to security and complexity. Next, he offers complete, self-contained coverage of each new set of technologies: how they work, how they are architected, and how they can be applied to solve real problems. Dr. Stallings presents a chapter-length analysis of emerging security issues in modern networks. He concludes with an up-to date discussion of networking careers, including important recent changes in roles and skill requirements. Coverage: Elements of the modern networking ecosystem: technologies, architecture, services, and applications Evolving requirements of current network environments SDN: concepts, rationale, applications, and standards across data, control, and application planes OpenFlow, OpenDaylight, and other key SDN technologies Network functions virtualization: concepts, technology, applications, and software defined infrastructure Ensuring customer Quality of Experience (QoE) with interactive video and multimedia network traffic Cloud networking: services, deployment models, architecture, and linkages to SDN and NFV IoT and fog computing in depth: key components of IoT-enabled devices, model architectures, and example implementations Securing SDN, NFV, cloud, and IoT environments Career preparation and ongoing education for tomorrow’s networking careers Key Features: Strong coverage of unifying principles and practical techniques More than a hundred figures that clarify key concepts Web support at williamstallings.com/Network/ QR codes throughout, linking to the website and other resources Keyword/acronym lists, recommended readings, and glossary Margin note definitions of key words throughout the text

Fog Edge Computing For Security Privacy and Applications

Fog Edge Computing For Security  Privacy  and Applications Book
Author : Wei Chang
Publisher : Springer Nature
Release : 2021-04-14
ISBN : 3030573281
Language : En, Es, Fr & De

GET BOOK

Book Description :

Download Fog Edge Computing For Security Privacy and Applications book written by Wei Chang, available in PDF, EPUB, and Kindle, or read full book online anywhere and anytime. Compatible with any devices.

Data and Applications Security and Privacy XXXIV

Data and Applications Security and Privacy XXXIV Book
Author : Anoop Singhal
Publisher : Springer Nature
Release : 2021-04-14
ISBN : 3030496694
Language : En, Es, Fr & De

GET BOOK

Book Description :

Download Data and Applications Security and Privacy XXXIV book written by Anoop Singhal, available in PDF, EPUB, and Kindle, or read full book online anywhere and anytime. Compatible with any devices.

Security of Networks and Services in an All Connected World

Security of Networks and Services in an All Connected World Book
Author : Daphne Tuncer,Robert Koch,Rémi Badonnel,Burkhard Stiller
Publisher : Springer
Release : 2017-06-29
ISBN : 331960774X
Language : En, Es, Fr & De

GET BOOK

Book Description :

​This book is open access under a CC BY 4.0 license. This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017. The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: security management; management of cloud environments and services, evaluation and experimental study of rich network services; security, intrusion detection, and configuration; autonomic and self-management solutions; and methods for the protection of infrastructure.

5G for the Connected World

5G for the Connected World Book
Author : Devaki Chandramouli,Rainer Liebhart,Juho Pirskanen
Publisher : John Wiley & Sons
Release : 2019-03-08
ISBN : 1119247136
Language : En, Es, Fr & De

GET BOOK

Book Description :

Comprehensive Handbook Demystifies 5G for Technical and Business Professionals in Mobile Telecommunication Fields Much is being said regarding the possibilities and capabilities of the emerging 5G technology, as the evolution towards 5G promises to transform entire industries and many aspects of our society. 5G for the Connected World offers a comprehensive technical overview that telecommunication professionals need to understand and take advantage of these developments. The book offers a wide-ranging coverage of the technical aspects of 5G (with special consideration of the 3GPP Release 15 content), how it enables new services and how it differs from LTE. This includes information on potential use cases, aspects of radio and core networks, spectrum considerations and the services primarily driving 5G development and deployment. The text also looks at 5G in relation to the Internet of Things, machine to machine communication and technical enablers such as LTE-M, NB-IoT and EC-GSM. Additional chapters discuss new business models for telecommunication service providers and vertical industries as a result of introducing 5G and strategies for staying ahead of the curve. Other topics include: Key features of the new 5G radio such as descriptions of new waveforms, massive MIMO and beamforming technologies as well as spectrum considerations for 5G radio regarding all possible bands Drivers, motivations and overview of the new 5G system – especially RAN architecture and technology enablers (e.g. service-based architecture, compute-storage split and network exposure) for native cloud deployments Mobile edge computing, Non-3GPP access, Fixed-Mobile Convergence Detailed overview of mobility management, session management and Quality of Service frameworks 5G security vision and architecture Ultra-low latency and high reliability use cases and enablers, challenges and requirements (e.g. remote control, industrial automation, public safety and V2X communication) An outline of the requirements and challenges imposed by massive numbers of devices connected to cellular networks While some familiarity with the basics of 3GPP networks is helpful, 5G for the Connected World is intended for a variety of readers. It will prove a useful guide for telecommunication professionals, standardization experts, network operators, application developers and business analysts (or students working in these fields) as well as infrastructure and device vendors looking to develop and integrate 5G into their products, and to deploy 5G radio and core networks.

Network Function Virtualization

Network Function Virtualization Book
Author : Ying Zhang
Publisher : John Wiley & Sons
Release : 2017-12-08
ISBN : 1119390621
Language : En, Es, Fr & De

GET BOOK

Book Description :

A horizontal view of newly emerged technologies in the field of network function virtualization (NFV), introducing the open source implementation efforts that bring NFV from design to reality This book explores the newly emerged technique of network function virtualization (NFV) through use cases, architecture, and challenges, as well as standardization and open source implementations. It is the first systematic source of information about cloud technologies' usage in the cellular network, covering the interplay of different technologies, the discussion of different design choices, and its impact on our future cellular network. Network Function Virtualization: Concepts and Applicability in 5G Networks reviews new technologies that enable NFV, such as Software Defined Networks (SDN), network virtualization, and cloud computing. It also provides an in-depth investigation of the most advanced open source initiatives in this area, including OPNFV, Openstack, and Opendaylight. Finally, this book goes beyond literature review and industry survey by describing advanced research topics such as service chaining, VNF orchestrations, and network verification of NFV systems. In addition, this resource: Introduces network function virtualization (NFV) from both industrial and academic perspectives Describes NFV's usage in mobile core networks, which is the essence of 5G implementation Offers readers a deep dive on NFV's enabling techniques such as SDN, virtualization, and cloud computing Network Function Virtualization: Concepts and Applicability in 5G Networks is an ideal book for researchers and university students who want to keep up with the ever-changing world of network function virtualization.

Orchestrating and Automating Security for the Internet of Things

Orchestrating and Automating Security for the Internet of Things Book
Author : Anthony Sabella,Rik Irons-Mclean,Marcelo Yannuzzi
Publisher : Cisco Press
Release : 2018-06-04
ISBN : 0134756916
Language : En, Es, Fr & De

GET BOOK

Book Description :

Master powerful techniques and approaches for securing IoT systems of all kinds–current and emerging Internet of Things (IoT) technology adoption is accelerating, but IoT presents complex new security challenges. Fortunately, IoT standards and standardized architectures are emerging to help technical professionals systematically harden their IoT environments. In Orchestrating and Automating Security for the Internet of Things, three Cisco experts show how to safeguard current and future IoT systems by delivering security through new NFV and SDN architectures and related IoT security standards. The authors first review the current state of IoT networks and architectures, identifying key security risks associated with nonstandardized early deployments and showing how early adopters have attempted to respond. Next, they introduce more mature architectures built around NFV and SDN. You’ll discover why these lend themselves well to IoT and IoT security, and master advanced approaches for protecting them. Finally, the authors preview future approaches to improving IoT security and present real-world use case examples. This is an indispensable resource for all technical and security professionals, business security and risk managers, and consultants who are responsible for systems that incorporate or utilize IoT devices, or expect to be responsible for them. · Understand the challenges involved in securing current IoT networks and architectures · Master IoT security fundamentals, standards, and modern best practices · Systematically plan for IoT security · Leverage Software-Defined Networking (SDN) and Network Function Virtualization (NFV) to harden IoT networks · Deploy the advanced IoT platform, and use MANO to manage and orchestrate virtualized network functions · Implement platform security services including identity, authentication, authorization, and accounting · Detect threats and protect data in IoT environments · Secure IoT in the context of remote access and VPNs · Safeguard the IoT platform itself · Explore use cases ranging from smart cities and advanced energy systems to the connected car · Preview evolving concepts that will shape the future of IoT security

Proceedings of the ACM International Workshop on Security in Software Defined Networks Network Function Virtualization

Proceedings of the ACM International Workshop on Security in Software Defined Networks   Network Function Virtualization Book
Author : Anonim
Publisher : Unknown
Release : 2019
ISBN : 9781450361798
Language : En, Es, Fr & De

GET BOOK

Book Description :

Download Proceedings of the ACM International Workshop on Security in Software Defined Networks Network Function Virtualization book written by , available in PDF, EPUB, and Kindle, or read full book online anywhere and anytime. Compatible with any devices.

Integrated Security Technologies and Solutions Volume II

Integrated Security Technologies and Solutions   Volume II Book
Author : Aaron Woland,Vivek Santuka,Jamie Sanbower,Chad Mitchell
Publisher : Cisco Press
Release : 2019-03-28
ISBN : 0134807677
Language : En, Es, Fr & De

GET BOOK

Book Description :

The essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity and virtualization Integrated Security Technologies and Solutions – Volume II brings together more expert-level instruction in security design, deployment, integration, and support. It will help experienced security and network professionals manage complex solutions, succeed in their day-to-day jobs, and prepare for their CCIE Security written and lab exams. Volume II focuses on the Cisco Identity Services Engine, Context Sharing, TrustSec, Application Programming Interfaces (APIs), Secure Connectivity with VPNs, and the virtualization and automation sections of the CCIE v5 blueprint. Like Volume I, its strong focus on interproduct integration will help you combine formerly disparate systems into seamless, coherent, next-generation security solutions. Part of the Cisco CCIE Professional Development Series from Cisco Press, it is authored by a team of CCIEs who are world-class experts in their Cisco security disciplines, including co-creators of the CCIE Security v5 blueprint. Each chapter starts with relevant theory, presents configuration examples and applications, and concludes with practical troubleshooting. Review the essentials of Authentication, Authorization, and Accounting (AAA) Explore the RADIUS and TACACS+ AAA protocols, and administer devices with them Enforce basic network access control with the Cisco Identity Services Engine (ISE) Implement sophisticated ISE profiling, EzConnect, and Passive Identity features Extend network access with BYOD support, MDM integration, Posture Validation, and Guest Services Safely share context with ISE, and implement pxGrid and Rapid Threat Containment Integrate ISE with Cisco FMC, WSA, and other devices Leverage Cisco Security APIs to increase control and flexibility Review Virtual Private Network (VPN) concepts and types Understand and deploy Infrastructure VPNs and Remote Access VPNs Virtualize leading Cisco Security products Make the most of Virtual Security Gateway (VSG), Network Function Virtualization (NFV), and microsegmentation

In network Security Analytics and Compliance Monitoring

In network Security Analytics and Compliance Monitoring Book
Author : Arun Raghuramu
Publisher : Unknown
Release : 2017
ISBN : 9780355763331
Language : En, Es, Fr & De

GET BOOK

Book Description :

Security compromises affecting millions of users and large organizations have come to the limelight in recent years. In addition, the explosion of smartphone use, the rapid growth of IoT (Internet of Things) technologies and the changing landscape of network architectures have created an ever widening attack surface for malicious adversaries. This dissertation focuses on an in-depth analysis of security threats in operational networks and utilizes empirical insights and trusted computing methods to design novel in-network security and compliance monitoring architectures. We begin with a characterization study of security threats seen in a large US-based cellular network with the aim to understand the current landscape of mobile malicious traffic. We combine and analyze data from multiple disparate data sources using analytics methods to garner insights about threats affecting over two million users. Our study based on cellular network packet traces and security event logs reveals a drastic increase in the penetration of mobile threats. Further, we perform an analysis of the aggregate network footprints of malicious and benign sites accessed by devices in the cellular network in this study. We analyze if there are distinct network access patterns which can be used to differentiate malicious and benign hosts. Our results from this work demonstrate that such separation could indeed be possible and a deeper analysis of this problem is warranted. In our follow-up study, we perform further analysis of malicious wireless traffic with a focus on detection of malicious domains. We comprehensively explore a large feature space of network and HTTP header based statistical features by performing big-data mining over a traffic trace from an operational WiFi network in this study. We show through our analysis that device-level and network-wide aggregations of network traffic statistics are both very effective in the detection of malicious domains. We also show that network traffic features perform better than features extracted from the HTTP header for screening malicious domains. We utilize these insights to create an effective, lightweight, first-stage screening filter for malicious domains built using network statistical features. The emergence of SDN (Software Defined Networks) introduces the possibility of performing in-network detection of threats utilizing empirical insights into the nature of malicious network traffic. We implement and evaluate the feasibility of a piggybacking based in-network intrusion prevention system called SDN-Defense. We demonstrate using real wireless traffic traces that up to 90% of malicious flows can be detected using just the initial four packets offloaded to SDN-Defense. We also provide a characterization of the cost-benefit trade-offs involved in deploying such a system on the SDN controller. A complementary trend to SDN is the adoption of Network Functions Virtualization (NFV). NFV enables Telco operators to be agile and flexibly scale their network service deployments. However, it makes it difficult to manage and monitor capacity and usage rights compliance of Virtual Network Functions (VNFs). Traditional usage rights compliance enforcement methods such as those based on in-person audits and dynamic issuing of keys inhibit the operators from truly leveraging NFV flexibility and lack trust guarantees. These mechanisms are limiting NFV deployments due to associated scalability, trust issues and management overhead. We address this emerging problem by designing a novel trusted framework for NFV usage rights compliance. This new architecture named Metered Boot provides a way to realize trusted, and scalable, capacity based usage rights compliance for NFV services.

SDN NFVSec 18

SDN NFVSec 18 Book
Author : Anonim
Publisher : Unknown
Release : 2018
ISBN : 0987650XXX
Language : En, Es, Fr & De

GET BOOK

Book Description :

Download SDN NFVSec 18 book written by , available in PDF, EPUB, and Kindle, or read full book online anywhere and anytime. Compatible with any devices.

Threat Landscape and Good Practice

Threat Landscape and Good Practice Book
Author : Anonim
Publisher : Unknown
Release : 2015
ISBN : 9789292041618
Language : En, Es, Fr & De

GET BOOK

Book Description :

5G represents the next major phase of mobile telecommunication systems and network architectures beyond the current 4G standards, aiming at extreme broadband and ultra-robust, low latency connectivity, to enable the programmable connectivity for the Internet of Everything. Despite the significant debate on the technical specifications and the technological maturity of 5G, which are under discussion in various fora, 5G is expected to affect positively and significantly several industry sectors ranging from ICT to industry sectors such as car and other manufacturing, health and agriculture in the period up to and beyond 2020. 5G will be driven by the influence of software on network functions, known as Software Defined Networking (SDN) and Network Function Virtualization (NFV). The key concept that underpins SDN is the logical centralization of network control functions by decoupling the control and packet forwarding functionality of the network.^NFV complements this vision through the virtualization of these functionalities based on recent advances in general server and enterprise IT virtualization. Considering the technological maturity of the technologies that 5G can leverage on, SDN is the one that is moving faster from development to production. To realize the business potential of SDN/5G, a number of technical issues related to the design and operation of Software Defined Networks need to be addressed. Amongst them, SDN/5G security is one of the key issues, that needs to be addressed comprehensively in order to avoid missing the business opportunities arising from SDN/5G. In this report, we review threats and potential compromises related to the security of SDN/5G networks. More specifically, this report contains a review of the emerging threat landscape of 5G networks with particular focus on Software Defined Networking. It also considers security of NFV and radio network access.^To provide a comprehensive account of the emerging threat SDN/5G landscape, this report has identified related network assets and the security threats, challenges and risks arising for these assets. Driven by the identified threats and risks, this report has also reviewed and identified existing security mechanisms and good practices for SDN/5G/NFV, and based on these it has analysed gaps and provided technical, policy and organizational recommendations for proactively enhancing the security of SDN/5G.

Learning OpenDaylight

Learning OpenDaylight Book
Author : Reza Toghraee
Publisher : Packt Publishing Ltd
Release : 2017-05-29
ISBN : 1782174370
Language : En, Es, Fr & De

GET BOOK

Book Description :

A practical guide to building programmable networks using OpenDaylight About This Book Learn and understand how SDN controllers operate and integrate with networks; this book's step-by-step tutorials will give you a strong foundation in SDN, NVF, and OpenDayLight. Learn how to map legacy Layer 2/3 networking technologies in the SDN world Add new services and capabilities to your infrastructure and quickly adopt SDN and NFV within your organization with OpenDayLight. Integrate and manage software-defined networks efficiently in your organization. Build innovative network applications with OpenDayLight and save time and resources. Who This Book Is For This book targets network engineers, network programmers and developers, administrators, and anyone with some level of networking experience who'd like to deploy OpenDayLight effectively. Familiarity with the day-to-day operations of computer networks is expected What You Will Learn Transition from legacy networking to software-defined networking Learn how SDN controllers work and manage a network using southbound and northbound APIs Learn how to deploy the OpenDayLight SDN controller and integrate it with virtual switches Understand the basic design and operation of the OpenDaylight platform Build simple MD-SAL OpenDaylight applications Build applications on top of OpenDayLight to trigger network changes based on different events Integrate OpenStack with OpenDayLight to build a fully managed network Learn how to build a software-defined datacenter using NFV and service-chaining technologies In Detail OpenDaylight is an open source, software-defined network controller based on standard protocols. It aims to accelerate the adoption of Software-Defined Networking (SDN) and create a solid foundation for Network Functions Virtualization (NFV). SDN is a vast subject; many network engineers find it difficult to get started with using and operating different SDN platforms. This book will give you a practical bridge from SDN theory to the practical, real-world use of SDN in datacenters and by cloud providers. The book will help you understand the features and use cases for SDN, NFV, and OpenDaylight. NFV uses virtualization concepts and techniques to create virtual classes for node functions. Used together, SDN and NFV can elevate the standards of your network architecture; generic hardware-saving costs and the advanced and abstracted software will give you the freedom to evolve your network in the future without having to invest more in costly equipment. By the end of this book, you will have learned how to design and deploy OpenDaylight networks and integrate them with physical network switches. You will also have mastered basic network programming over the SDN fabric. Style and approach This is a step-by-step tutorial aimed at getting you up-to-speed with OpenDayLight and ready to adopt it for your SDN (Software-Defined Networking) and NFV (Network Functions Virtualization) ecosystem.