Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chen, Yu-Jia | en_US |
dc.contributor.author | Lin, Feng-Yi | en_US |
dc.contributor.author | Wang, Li-Chun | en_US |
dc.contributor.author | Lin, Bao-Shuh | en_US |
dc.date.accessioned | 2015-12-02T03:01:00Z | - |
dc.date.available | 2015-12-02T03:01:00Z | - |
dc.date.issued | 2014-01-01 | en_US |
dc.identifier.issn | en_US | |
dc.identifier.uri | http://hdl.handle.net/11536/128655 | - |
dc.description.abstract | For security concerns, a security traversal service can route data flows through a sequences of security devices (middleboxes). In this paper, we identify the problem of delay guarantee in security traversal and propose a scheme to dynamically change the security traversal path. To provide deterministic delay guarantee with minimum virtual machine (VM) and transmission cost, we model this security traversal path determination as a constrained shortest path problem (CSP) and propose an optimal security traversal with middlebox addition (OSTMA) mechanism. Besides, we implement the proposed OSTMA mechanism in an Open Flow network by designing a centralized security traversal controller to dynamically monitor the network condition information and reconfigure the security traversal path. Our experimental results show that the proposed dynamic security traversal scheme can still achieve delay requirements for network topology changes and burst traffic. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Cloud datacenter | en_US |
dc.subject | Security traversal | en_US |
dc.subject | Open Flow networks | en_US |
dc.title | A Dynamic Security Traversal Mechanism for Providing Deterministic Delay Guarantee in SDN | en_US |
dc.type | Proceedings Paper | en_US |
dc.identifier.journal | 2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM) | en_US |
dc.contributor.department | 電機資訊學士班 | zh_TW |
dc.contributor.department | Undergraduate Honors Program of Electrical Engineering and Computer Science | en_US |
dc.identifier.wosnumber | WOS:000363902700071 | en_US |
dc.citation.woscount | 0 | en_US |
Appears in Collections: | Conferences Paper |