A flexible architecture for orchestrating network security functions to support high-level security policies

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

Network Functions Virtualization (NFV) has provided a new way to design and deploy network security services, but it may fail to build a practically useful ecosystem that seamlessly integrates network security services if there is no standard interface between them. We propose a generic architecture for security management service based on Network Security Functions (NSF) using NFV. The proposed architecture allows users to define their security requirements in a user-friendly manner by providing the users with high-level security interfaces that do not require specific information about network resources and protocols. We design basic components (e.g., Security policy manager, NSF capability manager, Application logic, Policy updater and Event collector) and interfaces for the proposed architecture. We introduce three use cases: (1) blacklists of dangerous domains, (2) time-dependent access control policies and (3) detection of suspicious calls for VoIP-VoLTE services. We also explain how to implement our proposed architecture with an illustrative example. Furthermore, we discuss several technical challenges to deploy the proposed architecture in a real network environment.

Original languageEnglish
Title of host publicationProceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017
PublisherAssociation for Computing Machinery, Inc
ISBN (Electronic)9781450348881
DOIs
StatePublished - 5 Jan 2017
Event11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017 - Beppu, Japan
Duration: 5 Jan 20177 Jan 2017

Publication series

NameProceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017

Conference

Conference11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017
Country/TerritoryJapan
CityBeppu
Period5/01/177/01/17

Keywords

  • NFV
  • NSF
  • Security management
  • Security policy

Fingerprint

Dive into the research topics of 'A flexible architecture for orchestrating network security functions to support high-level security policies'. Together they form a unique fingerprint.

Cite this