ABSTRACT
In modern days security systems often reach their performance peak and limit the protected application. Utilizing the available resources for security more efficiently is becoming more critical. In this paper, we introduce the claim, that no static security function chain is optimal in every situation. First experiments prove our claim.
- Lukas Iffländer, Stefan Geißler, Jürgen Walter, Lukas Beierlieb, and Samuel Kounev. 2018. Addressing Shortcomings of Existing DDoS Protection Software Using Software-Defined Networking. In Proceedings of the 9th Symposium on Software Performance 2018 (SSP'18).Google Scholar
- Lukas Iffländer, Jonathan Stoll, Nishant Rawtani, Veronika Lesch, Klaus-DieterLange, and Samuel Kounev. 2019. Performance Oriented Dynamic By-passing for Intrusion Detection Systems. In Proceedings of the 2019 ACM/SPEC International Conference on Performance Engineering (ICPE '19). ACM, New York, NY, USA, 8. Google ScholarDigital Library
- Lukas Iffländer, Jürgen Walter, Simon Eismann, and Samuel Kounev. 2018. TheVision of Self-aware Reordering of Security Network Function Chains. In Companion of the 2018 ACM/SPEC International Conference on Performance Engineering - ICPE'18 (ICPE '18). ACM Press, New York, NY, USA, 1--4. Google ScholarDigital Library
- Thomas N. Theis and H.-S. Philip Wong. 2017. The End of Moore's Law: A New Beginning for Information Technology. Computing in Science & Engineering 19, 2(mar 2017), 41--50. Google ScholarDigital Library
- Jóakim von Kistowski, Maximilian Deffner, and Samuel Kounev. 2018. Run-Time Prediction of Power Consumption for Component Deployments. In Proceedings ofthe 15th IEEE International Conference on Autonomic Computing (ICAC 2018). IEEE.Google ScholarCross Ref
Index Terms
- Performance Influence of Security Function Chain Ordering
Recommendations
Performance Oriented Dynamic Bypassing for Intrusion Detection Systems
ICPE '19: Proceedings of the 2019 ACM/SPEC International Conference on Performance EngineeringAttacks on software systems are becoming more and more frequent, aggressive and sophisticated. With the changing threat landscape, in 2018, organizations are looking at when they will be attacked, not if. Intrusion Detection Systems (IDSs) can help in ...
Research on Campus Network Security Problem and Protection Strategy
With the "Internet +" era of arrival, the major colleges and universities are in the construction of the wisdom of the campus, students and teachers living with the campus network is more and more closely related, Campus network security has become the ...
Security aspects in IPv6 networks - implementation and testing
IPv6 protocol, which should replace the actual IPv4 protocol, brings many new possibilities and improvements considering simplicity, routing speed, quality of service and security. In comparison to IPv4, IPv6 improves mechanisms for assuring a secure ...
Comments