This work is supported by the National Key R&D Program of China(2018YFB1800601);the Key R&D Program of Zhejiang Province(2021C01036,2020C01021);the Fundamental Research Funds for the Central Universities(Zhejiang University NGICS Platform:ZJUNGICS2021021).
Service function chains(SFC)mapping takes the responsibility for managing virtual network functions(VNFs).In SFC mapping,existing solutions duplicate VNFs with redundant instances to provide high availability in respo...
sponsored by the National Natural Science Foundation of China granted No.61872430, 61402342, 61772384;the National Basic Research Program of China 973 Program granted No.2014CB340601;Foundation of Science and Technology on Information Assurance Laboratory (No. KJ-17-103)
Network functions such as intrusion detection systems (IDS) have been increasingly deployed as virtual network functions or outsourced to cloud service providers so as to achieve the scalability and agility, and reduc...
support by the Major National Science and Technology Projects (No. 2018ZX03001019-003, 2018ZX03001014-003)
Caching and virtualization have been considered as the promising techniques in 5G Networks. In 5G networks with virtualization, the caching resources deployed by infrastructure providers (InPs) can be abstracted into ...
supported by National Natural Science Foundation of China (No. 61772271, 61379149)
As a promising technology to completely transform how we architect, deploy, operate and manage various networks, software-based Network Function Virtualization(NFV) enables hardware-independent, flexible, fast and eff...
supported by Foundation for Innovative Research Groups of the National Natural Science Foundation of China(61521003);National Key Research and Development Plan(2016YFB0800101);National Natural Science Foundation of China(61602509)
Nowadays network virtualization is utterly popular.As a result,how to protect the virtual networks from attacking on the link is increasingly important.Existing schemes are mainly backup-based,which suffer from data l...
supported in part by national Key Project (2016ZX03001021)
The fast deployment and penetration of 4G has cultivated human behaviors on mobile data consumption, leading to explosive growth in mobile traffic and stimulating new requirements on the capabilities of mobile network...
In traditional networks,enabling new network functions often needs to add new proprietary middleboxes.However,finding the space and power to accommodate these middleboxes is becoming increasingly difficult,
supported by the National Natural Science Foundation of China(61501044)
Network function virtualization is a new network concept that moves network functions from dedicated hardware to software-defined applications running on standard high volume severs. In order to accomplish network ser...
partially supported by the NSFC-General Technology Basic Research Joint Fund (U1536204);the National Key Technologies R&D Program (2014BAH41B00);the National Nature Science Foundation of China (61672394; 61373168; 61373169);the National High-tech R&D Program of China (863 Program) (2015AA016004)
APT attacks are prolonged and have multiple stages, and they usually utilize zero-day or one-day exploits to be penetrating and stealthy. Among all kinds of security tech- niques, provenance tracing is regarded as an ...
supported in part by National Natural Science Foundation of China(61372070);Hong Kong,Macao and Taiwan Science & Technology Cooperation Program of China(2014DFT10320);the 111 Project(B08038)
Network slicing achieves many interests from industry and academics due to its flexibility and scalability.In this paper,we present a novel slicing scheme for radio access networks(RANs) based on control/user(C/U) pla...