ZTSFC: A Service Function Chaining-Enabled Zero Trust Architecture
L Bradatsch, O Miroshkin, F Kargl - IEEE Access, 2023 - ieeexplore.ieee.org
Recently, zero trust security has received notable attention in the security community.
However, while many networks use monitoring and security functions like firewalls, their …
However, while many networks use monitoring and security functions like firewalls, their …
Integration of Security Service Functions into Network-level Access Control
L Bradatsch, F Kargl - IEEE Access, 2024 - ieeexplore.ieee.org
Service function chaining is an approach to dynamically steer traffic through different service
functions like intrusion prevention systems within a local area network. Existing approaches …
functions like intrusion prevention systems within a local area network. Existing approaches …
Provably efficient security-aware service function tree composing and embedding in multi-vendor networks
Multicast greatly benefits many emerging applications such as federated learning,
metaverse, and data warehouse. Recently, due to frequent cyber-attacks, multicast services …
metaverse, and data warehouse. Recently, due to frequent cyber-attacks, multicast services …
Cost optimization in security-aware service function chain deployment with diverse vendors
Frequent cyber-attacks force the service provider to employ security-aware service functions
(SFs) to accommodate client network requests. Thanks to virtualization techniques' maturity …
(SFs) to accommodate client network requests. Thanks to virtualization techniques' maturity …
Towards cost optimization in security-aware service function chaining and embedding over multi-vendor edge networks
Frequent cyber-attacks compel service providers to employ security-aware service functions
(S-SFs) while delivering network services. Typically, one S-SF can be implemented by …
(S-SFs) while delivering network services. Typically, one S-SF can be implemented by …
Deploying Security-Aware Service Function Chains with Asymmetric Dedicated Protection
In the emerging applications of edge computing (eg, unmanned factories and meta-verse),
network requests are required to be securely and reliably delivered in the form of service …
network requests are required to be securely and reliably delivered in the form of service …
Torrent Poisoning Protection with a Reverse Proxy Server
A Distributed Denial-of-Service attack uses multiple sources operating in concert to attack a
network or site. A typical DDoS flood attack on a website targets a web server with multiple …
network or site. A typical DDoS flood attack on a website targets a web server with multiple …
Zero Trust Score-based Network-level Access Control in Enterprise Networks
Zero Trust security has recently gained attention in enterprise network security. One of its
key ideas is making network-level access decisions based on trust scores. However, score …
key ideas is making network-level access decisions based on trust scores. However, score …
Efficient Zero-Trust-enabled Service Function Chain Deployment in Multi-Vendor Networks
With the advent of zero trust (ZT) security architectures, vendors can bolster their services'
security by continuously verifying every end-to-end traffic flow through the policy …
security by continuously verifying every end-to-end traffic flow through the policy …