skip to main content
10.1145/3302541.3311965acmconferencesArticle/Chapter ViewAbstractPublication PagesicpeConference Proceedingsconference-collections
demonstration

Performance Influence of Security Function Chain Ordering

Published:27 March 2019Publication History

ABSTRACT

In modern days security systems often reach their performance peak and limit the protected application. Utilizing the available resources for security more efficiently is becoming more critical. In this paper, we introduce the claim, that no static security function chain is optimal in every situation. First experiments prove our claim.

References

  1. Lukas Iffländer, Stefan Geißler, Jürgen Walter, Lukas Beierlieb, and Samuel Kounev. 2018. Addressing Shortcomings of Existing DDoS Protection Software Using Software-Defined Networking. In Proceedings of the 9th Symposium on Software Performance 2018 (SSP'18).Google ScholarGoogle Scholar
  2. Lukas Iffländer, Jonathan Stoll, Nishant Rawtani, Veronika Lesch, Klaus-DieterLange, and Samuel Kounev. 2019. Performance Oriented Dynamic By-passing for Intrusion Detection Systems. In Proceedings of the 2019 ACM/SPEC International Conference on Performance Engineering (ICPE '19). ACM, New York, NY, USA, 8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Lukas Iffländer, Jürgen Walter, Simon Eismann, and Samuel Kounev. 2018. TheVision of Self-aware Reordering of Security Network Function Chains. In Companion of the 2018 ACM/SPEC International Conference on Performance Engineering - ICPE'18 (ICPE '18). ACM Press, New York, NY, USA, 1--4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Thomas N. Theis and H.-S. Philip Wong. 2017. The End of Moore's Law: A New Beginning for Information Technology. Computing in Science & Engineering 19, 2(mar 2017), 41--50. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Jóakim von Kistowski, Maximilian Deffner, and Samuel Kounev. 2018. Run-Time Prediction of Power Consumption for Component Deployments. In Proceedings ofthe 15th IEEE International Conference on Autonomic Computing (ICAC 2018). IEEE.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Performance Influence of Security Function Chain Ordering

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                ICPE '19: Companion of the 2019 ACM/SPEC International Conference on Performance Engineering
                March 2019
                99 pages
                ISBN:9781450362863
                DOI:10.1145/3302541

                Copyright © 2019 Owner/Author

                Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 27 March 2019

                Check for updates

                Qualifiers

                • demonstration

                Acceptance Rates

                Overall Acceptance Rate252of851submissions,30%

                Upcoming Conference

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader