메뉴 건너뛰기




Volumn 6, Issue 1, 2015, Pages

Virtual network security: threats, countermeasures, and challenges

Author keywords

Countermeasures; Network virtualization; Security; Threats

Indexed keywords

MOBILE SECURITY; NETWORK ARCHITECTURE; RADAR COUNTERMEASURES; VIRTUAL REALITY;

EID: 84923247660     PISSN: 18674828     EISSN: 18690238     Source Type: Journal    
DOI: 10.1186/s13174-014-0015-z     Document Type: Article
Times cited : (34)

References (41)
  • 1
    • 77249132188 scopus 로고    scopus 로고
    • A survey of network virtualization
    • Chowdhury NMMK, Boutaba R (2010) A survey of network virtualization. Comput Netw 54(5): 862–876.
    • (2010) Comput Netw , vol.54 , Issue.5 , pp. 862-876
    • Chowdhury, N.M.M.K.1    Boutaba, R.2
  • 3
    • 18144370444 scopus 로고    scopus 로고
    • Overcoming the internet impasse through virtualization
    • Anderson T, Peterson L, Shenker S, Turner J (2005) Overcoming the internet impasse through virtualization. Computer 38(4): 34–41.
    • (2005) Computer , vol.38 , Issue.4 , pp. 34-41
    • Anderson, T.1    Peterson, L.2    Shenker, S.3    Turner, J.4
  • 6
    • 84936799137 scopus 로고    scopus 로고
    • Entropy-based collaborative detection of ddos attacks on community networks
    • IEEE Computer Society, Washington, DC, USA:
    • Yu S, Zhou W (2008) Entropy-based collaborative detection of ddos attacks on community networks In: IEEE International Conference on Pervasive Computing and Communications. IEEE Computer Society, Washington, DC, USA.
    • (2008) IEEE International Conference on Pervasive Computing and Communications
    • Yu, S.1    Zhou, W.2
  • 9
    • 84923237483 scopus 로고    scopus 로고
    • Rosen E, Cisco Systems I, Rekhter Y, Juniper Networks I (2006) RFC 4364: BGP/MPLS IP Virtual Private Networks (VPNs)
    • Rosen E, Cisco Systems I, Rekhter Y, Juniper Networks I (2006) RFC 4364: BGP/MPLS IP Virtual Private Networks (VPNs). http://www.ietf.org/rfc/rfc4364.txt.
  • 16
    • 84923237479 scopus 로고    scopus 로고
    • Shirey R (2000) RFC 2828: Internet Security Glossary
    • Shirey R (2000) RFC 2828: Internet Security Glossary. http://www.ietf.org/rfc/rfc2828.txt.
  • 21
    • 64749106583 scopus 로고    scopus 로고
    • Design and implementation of a network supporting environment for virtual experimental platforms
    • IEEE Computer Society, Washington, DC, USA:
    • Cui Q, Shi W, Wang Y (2009) Design and implementation of a network supporting environment for virtual experimental platforms In: WRI International Conference on Communications and Mobile Computing. IEEE Computer Society, Washington, DC, USA.
    • (2009) WRI International Conference on Communications and Mobile Computing
    • Cui, Q.1    Shi, W.2    Wang, Y.3
  • 23
    • 84883080815 scopus 로고    scopus 로고
    • Adversarial vnet embeddings: A threat for isps?
    • IEEE, Turin, Italy:
    • Pignolet Y-A, Schmid S, Tredan G (2013) Adversarial vnet embeddings: A threat for isps? In: IEEE INFOCOM. IEEE, Turin, Italy.
    • (2013) IEEE INFOCOM
    • Pignolet, Y.-A.1    Schmid, S.2    Tredan, G.3
  • 24
    • 84891628907 scopus 로고    scopus 로고
    • Minimum disclosure routing for network virtualization and its experimental evaluation
    • Fukushima M, Sugiyama K, Hasegawa T, Hasegawa T, Nakao A (2013) Minimum disclosure routing for network virtualization and its experimental evaluation. IEEE/ACM Trans NetwPP(99): 1839–1851.
    • (2013) IEEE/ACM Trans Netw , vol.PP , Issue.99 , pp. 1839-1851
    • Fukushima, M.1    Sugiyama, K.2    Hasegawa, T.3    Hasegawa, T.4    Nakao, A.5
  • 27
    • 77951554648 scopus 로고    scopus 로고
    • Multinet: multiple virtual networks for a reliable live streaming service
    • IEEE Press, Piscataway, USA:
    • Zhang Y, Gao L, Wang C (2009) Multinet: multiple virtual networks for a reliable live streaming service In: IEEE Conference on Global Telecommunications. IEEE Press, Piscataway, USA.
    • (2009) IEEE Conference on Global Telecommunications
    • Zhang, Y.1    Gao, L.2    Wang, C.3
  • 32
    • 84872738200 scopus 로고    scopus 로고
    • Designing and embedding reliable virtual infrastructures
    • Yeow W-L, Westphal C, Kozat UC (2011) Designing and embedding reliable virtual infrastructures. SIGCOMM Comput Commun Rev 41(2): 57–64.
    • (2011) SIGCOMM Comput Commun Rev , vol.41 , Issue.2 , pp. 57-64
    • Yeow, W.-L.1    Westphal, C.2    Kozat, U.C.3
  • 33
    • 84904210552 scopus 로고    scopus 로고
    • A survivable virtual network embedding scheme based on load balancing and reconfiguration
    • IEEE, Krakow, Poland:
    • Chen Q, Wan Y, Qiu X, Li W, Xiao A (2014) A survivable virtual network embedding scheme based on load balancing and reconfiguration In: IEEE Network Operations and Management Symposium. IEEE, Krakow, Poland.
    • (2014) IEEE Network Operations and Management Symposium
    • Chen, Q.1    Wan, Y.2    Qiu, X.3    Li, W.4    Xiao, A.5
  • 34
    • 84904434343 scopus 로고    scopus 로고
    • Venice: Reliable virtual data center embedding in clouds
    • IEEE, Toronto, Canada:
    • Zhang Q, Zhani MF, Jabri M, Boutaba R (2014) Venice: Reliable virtual data center embedding in clouds In: IEEE INFOCOM. IEEE, Toronto, Canada.
    • (2014) IEEE INFOCOM
    • Zhang, Q.1    Zhani, M.F.2    Jabri, M.3    Boutaba, R.4
  • 35
    • 84879739178 scopus 로고    scopus 로고
    • Disaster-resilient virtual-network mapping and adaptation in optical networks In, International Conference on Optical Network Design and Modeling:
    • Meixner CC, Dikbiyik F, Tornatore M, Chuah C, Mukherjee B (2013) Disaster-resilient virtual-network mapping and adaptation in optical networks In: International Conference on Optical Network Design and Modeling.
    • (2013) Mukherjee B
    • Meixner, C.C.1    Dikbiyik, F.2    Tornatore, M.3    Chuah, C.4
  • 37
    • 84923237466 scopus 로고    scopus 로고
    • Common Vulnerabilities and Exposures (2012) CVE-2012-1516
    • Common Vulnerabilities and Exposures (2012) CVE-2012-1516. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1516.
  • 38
    • 84923237465 scopus 로고    scopus 로고
    • Common Vulnerabilities and Exposures (2012) CVE-2012-1517
    • Common Vulnerabilities and Exposures (2012) CVE-2012-1517. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1517.
  • 39
    • 84923237464 scopus 로고    scopus 로고
    • Common Vulnerabilities and Exposures (2012) CVE-2012-2449
    • Common Vulnerabilities and Exposures (2012) CVE-2012-2449. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2449.
  • 40
    • 84923237463 scopus 로고    scopus 로고
    • Common Vulnerabilities and Exposures (2012) CVE-2012-2450
    • Common Vulnerabilities and Exposures (2012) CVE-2012-2450. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2450.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.