The definition of elastic network services that can be orchestrated at run-time brings unprecedented agility and dynamicity in network operation, but also complicates security management. As a matter of fact, cyber-security appliances are still largely stuck to traditional paradigms, based on relatively static topologies and the security...
-
2019 (v1)PublicationUploaded on: April 14, 2023
-
2019 (v1)Publication
The uptake of virtualization and cloud technologies has pushed novel development and operation models for the software, bringing more agility and automation. Unfortunately, cyber-security paradigms have not evolved at the same pace and are not yet able to effectively tackle the progressive disappearing of a sharp security perimeter. In this...
Uploaded on: April 14, 2023 -
2017 (v1)Publication
Fog computing has been proposed to improve the cloud computing functionality by moving computation and storage resources closer to end-users, thus reducing end-to-end latency to make new personal services available. However, a number of issues need to be overcome in order to deploy this new technology, which include scalability of user...
Uploaded on: March 27, 2023 -
2016 (v1)Publication
In order to overcome the cloud service performance limits, the INPUT Project aims to go beyond the typical IaaS-based service models by moving computing and storage capabilities from the datacenters to the edge network, and consequently moving cloud services closer to the end users. This approach, which is compatible with the concept of fog...
Uploaded on: April 14, 2023 -
2021 (v1)Publication
Volumetric (Distributed) Denial of Service attacks remain one of the major threats for any organization, capable of saturating most Internet access links through the usage of botnets and amplification techniques. The only effective mitigation mechanism today is the redirection of the network traffic towards scrubbing centers; this protects the...
Uploaded on: April 14, 2023 -
2013 (v1)Publication
No description
Uploaded on: April 14, 2023 -
2019 (v1)Publication
The virtualization of applications and network functions facilitates the dynamic creation of compound services, automating both the provisioning of computing/networking/storage resources and their life-cycle management. Virtualization of security appliances is a common approach to protect such services, but can neither offer broad visibility...
Uploaded on: April 14, 2023 -
2020 (v1)Publication
While the integration of fourth-generation (4G) networks with Edge Computing technologies would anticipate the improvements foreseen by the coming of 5G, as well as smoothen the transition to the new technology, 4G does not natively support Edge Computing. Therefore, specific functionalities for user-plane integration and isolation of tenant...
Uploaded on: April 14, 2023 -
2014 (v1)Publication
No description
Uploaded on: June 2, 2023 -
2013 (v1)Publication
No description
Uploaded on: April 14, 2023