{"id":"https://openalex.org/W3011744656","doi":"https://doi.org/10.1109/nfv-sdn47374.2019.9040068","title":"Towards Novel Security Architectures for Network Functions Virtualization","display_name":"Towards Novel Security Architectures for Network Functions Virtualization","publication_year":2019,"publication_date":"2019-11-01","ids":{"openalex":"https://openalex.org/W3011744656","doi":"https://doi.org/10.1109/nfv-sdn47374.2019.9040068","mag":"3011744656"},"language":"en","primary_location":{"id":"doi:10.1109/nfv-sdn47374.2019.9040068","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nfv-sdn47374.2019.9040068","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://zenodo.org/record/3813154","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001542206","display_name":"Matteo Repetto","orcid":"https://orcid.org/0000-0001-8478-2633"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"M. Repetto","raw_affiliation_strings":["S2N Lab, CNIT Genoa, Italy"],"affiliations":[{"raw_affiliation_string":"S2N Lab, CNIT Genoa, Italy","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089578957","display_name":"Alessandro Carrega","orcid":"https://orcid.org/0000-0002-5944-7582"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"A. Carrega","raw_affiliation_strings":["S2N Lab, CNIT Genoa, Italy"],"affiliations":[{"raw_affiliation_string":"S2N Lab, CNIT Genoa, Italy","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011298044","display_name":"Guerino Lamanna","orcid":"https://orcid.org/0000-0002-6930-4227"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"G. Lamanna","raw_affiliation_strings":["Infocom Srl Genoa, Italy"],"affiliations":[{"raw_affiliation_string":"Infocom Srl Genoa, Italy","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5001542206"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.24351679,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"1","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7761199474334717},{"id":"https://openalex.org/keywords/microservices","display_name":"Microservices","score":0.7381105422973633},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.6099632978439331},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5742719173431396},{"id":"https://openalex.org/keywords/virtual-network","display_name":"Virtual network","score":0.4907132387161255},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.4618247151374817},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.44022130966186523},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.43216612935066223},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.418460875749588},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.399547815322876},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.28738898038864136},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.19250303506851196},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1238749623298645}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7761199474334717},{"id":"https://openalex.org/C2778505942","wikidata":"https://www.wikidata.org/wiki/Q18344624","display_name":"Microservices","level":3,"score":0.7381105422973633},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.6099632978439331},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5742719173431396},{"id":"https://openalex.org/C2776874963","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Virtual network","level":2,"score":0.4907132387161255},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.4618247151374817},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.44022130966186523},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.43216612935066223},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.418460875749588},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.399547815322876},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.28738898038864136},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.19250303506851196},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1238749623298645},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/nfv-sdn47374.2019.9040068","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nfv-sdn47374.2019.9040068","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","raw_type":"proceedings-article"},{"id":"pmh:oai:iris.unige.it:11567/1076786","is_oa":false,"landing_page_url":"https://hdl.handle.net/11567/1076786","pdf_url":null,"source":{"id":"https://openalex.org/S4377196291","display_name":"CINECA IRIS Institutial Research Information System (University of Genoa)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I83816512","host_organization_name":"University of Genoa","host_organization_lineage":["https://openalex.org/I83816512"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"},{"id":"pmh:oai:zenodo.org:3813154","is_oa":true,"landing_page_url":"https://zenodo.org/record/3813154","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferencePaper"}],"best_oa_location":{"id":"pmh:oai:zenodo.org:3813154","is_oa":true,"landing_page_url":"https://zenodo.org/record/3813154","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferencePaper"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W97539848","https://openalex.org/W2033929907","https://openalex.org/W2132539529","https://openalex.org/W2625999650","https://openalex.org/W2738463787","https://openalex.org/W2773235317","https://openalex.org/W2795612977","https://openalex.org/W2902436748","https://openalex.org/W6658855384"],"related_works":["https://openalex.org/W2964344204","https://openalex.org/W2786729088","https://openalex.org/W2086178534","https://openalex.org/W1561562093","https://openalex.org/W2907868081","https://openalex.org/W2120086576","https://openalex.org/W2784006287","https://openalex.org/W2222589037","https://openalex.org/W4206910357","https://openalex.org/W2056275442"],"abstract_inverted_index":{"The":[0,49],"definition":[1],"of":[2,28,51,121,132],"elastic":[3],"network":[4,18,81],"services":[5,62],"that":[6,98],"can":[7],"be":[8],"orchestrated":[9],"at":[10],"run-time":[11],"brings":[12],"unprecedented":[13],"agility":[14],"and":[15,44,54,67,88,96,102,110],"dynamicity":[16],"in":[17,74,126,136],"operation,":[19],"but":[20],"also":[21],"complicates":[22],"security":[23,46,61,104],"management.":[24],"As":[25],"a":[26,90,100],"matter":[27],"fact,":[29],"cyber-security":[30],"appliances":[31],"are":[32,71],"still":[33],"largely":[34],"stuck":[35],"to":[36,59],"traditional":[37],"paradigms,":[38],"based":[39],"on":[40],"relatively":[41],"static":[42],"topologies":[43],"the":[45,115,119],"perimeter":[47],"model.":[48],"uptake":[50],"service-oriented":[52],"architectures":[53],"microservices":[55],"is":[56],"now":[57],"suggesting":[58],"compose":[60],"by":[63],"orchestrating":[64],"monitoring,":[65,94],"inspection,":[66],"enforcement":[68,97],"capabilities,":[69],"which":[70],"natively":[72],"implemented":[73],"each":[75,137],"elementary":[76],"component":[77],"(virtual":[78],"functions,":[79],"software-defined":[80],"equipment).":[82],"In":[83],"this":[84],"paper,":[85],"we":[86],"describe":[87],"evaluate":[89],"novel":[91],"framework":[92],"for":[93,106],"inspection":[95],"provides":[99],"broad":[101],"heterogeneous":[103],"context":[105],"centralized":[107],"analytics,":[108],"correlation":[109],"detection.":[111],"Our":[112],"work":[113],"represents":[114],"preliminary":[116],"step":[117],"towards":[118],"creation":[120],"true":[122],"Security-as-a-Service":[123],"(SecaaS)":[124],"paradigms":[125],"virtualized":[127],"environments,":[128],"through":[129],"programmatic":[130],"composition":[131],"common":[133],"capabilities":[134],"available":[135],"virtual":[138],"function.":[139]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
