ZTSFC: A Service Function Chaining-Enabled Zero Trust Architecture

L Bradatsch, O Miroshkin, F Kargl - IEEE Access, 2023 - ieeexplore.ieee.org
Recently, zero trust security has received notable attention in the security community.
However, while many networks use monitoring and security functions like firewalls, their …

Integration of Security Service Functions into Network-level Access Control

L Bradatsch, F Kargl - IEEE Access, 2024 - ieeexplore.ieee.org
Service function chaining is an approach to dynamically steer traffic through different service
functions like intrusion prevention systems within a local area network. Existing approaches …

Provably efficient security-aware service function tree composing and embedding in multi-vendor networks

D Zheng, H **ng, L Feng, X Cao - Computer Networks, 2024 - Elsevier
Multicast greatly benefits many emerging applications such as federated learning,
metaverse, and data warehouse. Recently, due to frequent cyber-attacks, multicast services …

Cost optimization in security-aware service function chain deployment with diverse vendors

D Zheng, X Liu, W Tang, H Xu… - GLOBECOM 2023-2023 …, 2023 - ieeexplore.ieee.org
Frequent cyber-attacks force the service provider to employ security-aware service functions
(SFs) to accommodate client network requests. Thanks to virtualization techniques' maturity …

Towards cost optimization in security-aware service function chaining and embedding over multi-vendor edge networks

C Wang, D Zheng, X Liu, W Tang, H Xu, X Cao - Computer Networks, 2025 - Elsevier
Frequent cyber-attacks compel service providers to employ security-aware service functions
(S-SFs) while delivering network services. Typically, one S-SF can be implemented by …

Deploying Security-Aware Service Function Chains with Asymmetric Dedicated Protection

D Zheng, S Cao, H Xu, X Cao - ICC 2024-IEEE International …, 2024 - ieeexplore.ieee.org
In the emerging applications of edge computing (eg, unmanned factories and meta-verse),
network requests are required to be securely and reliably delivered in the form of service …

Torrent Poisoning Protection with a Reverse Proxy Server

A Godinho, J Rosado, F Sá, F Caldeira, F Cardoso - Electronics, 2022 - mdpi.com
A Distributed Denial-of-Service attack uses multiple sources operating in concert to attack a
network or site. A typical DDoS flood attack on a website targets a web server with multiple …

Zero Trust Score-based Network-level Access Control in Enterprise Networks

L Bradatsch, O Miroshkin, N Trkulja… - 2023 IEEE 22nd …, 2023 - ieeexplore.ieee.org
Zero Trust security has recently gained attention in enterprise network security. One of its
key ideas is making network-level access decisions based on trust scores. However, score …

Efficient Zero-Trust-enabled Service Function Chain Deployment in Multi-Vendor Networks

D Zheng, H **ng, X Cao, J Xu - techrxiv.org
With the advent of zero trust (ZT) security architectures, vendors can bolster their services'
security by continuously verifying every end-to-end traffic flow through the policy …