Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22)
  • Open Access

    ARTICLE

    Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques

    Nasser Alshammari1, Shumaila Shahzadi2, Saad Awadh Alanazi1,*, Shahid Naseem3, Muhammad Anwar3, Madallah Alruwaili4, Muhammad Rizwan Abid5, Omar Alruwaili4, Ahmed Alsayat1, Fahad Ahmad6,7

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 363-394, 2024, DOI:10.32604/csse.2023.040721

    Abstract Software Defined Network (SDN) and Network Function Virtualization (NFV) technology promote several benefits to network operators, including reduced maintenance costs, increased network operational performance, simplified network lifecycle, and policies management. Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration (NFV MANO), and malicious attacks in different scenarios disrupt the NFV Orchestrator (NFVO) and Virtualized Infrastructure Manager (VIM) lifecycle management related to network services or individual Virtualized Network Function (VNF). This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and… More >

  • Open Access

    ARTICLE

    Performance Comparison of Hyper-V and KVM for Cryptographic Tasks in Cloud Computing

    Nader Abdel Karim1,*, Osama A. Khashan2,*, Waleed K. Abdulraheem3, Moutaz Alazab1, Hasan Kanaker4, Mahmoud E. Farfoura5, Mohammad Alshinwan5,6

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2023-2045, 2024, DOI:10.32604/cmc.2023.044304

    Abstract As the extensive use of cloud computing raises questions about the security of any personal data stored there, cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment. A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of hardware. The choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud environment. An important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance; Each hypervisor… More >

  • Open Access

    ARTICLE

    An Adaptive Hybrid Optimization Strategy for Resource Allocation in Network Function Virtualization

    Chumei Wen1, Delu Zeng2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1617-1636, 2024, DOI:10.32604/cmes.2023.029864

    Abstract With the rapid development of Network Function Virtualization (NFV), the problem of low resource utilization in traditional data centers is gradually being addressed. However, existing research does not optimize both local and global allocation of resources in data centers. Hence, we propose an adaptive hybrid optimization strategy that combines dynamic programming and neural networks to improve resource utilization and service quality in data centers. Our approach encompasses a service function chain simulation generator, a parallel architecture service system, a dynamic programming strategy for maximizing the utilization of local server resources, a neural network for predicting More >

  • Open Access

    ARTICLE

    Optimizing Resource Allocation Framework for Multi-Cloud Environment

    Tahir Alyas1, Taher M. Ghazal2,3, Badria Sulaiman Alfurhood4, Ghassan F. Issa2, Osama Ali Thawabeh5, Qaiser Abbas6,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4119-4136, 2023, DOI:10.32604/cmc.2023.033916

    Abstract Cloud computing makes dynamic resource provisioning more accessible. Monitoring a functioning service is crucial, and changes are made when particular criteria are surpassed. This research explores the decentralized multi-cloud environment for allocating resources and ensuring the Quality of Service (QoS), estimating the required resources, and modifying allotted resources depending on workload and parallelism due to resources. Resource allocation is a complex challenge due to the versatile service providers and resource providers. The engagement of different service and resource providers needs a cooperation strategy for a sustainable quality of service. The objective of a coherent and… More >

  • Open Access

    ARTICLE

    Performance Evaluation of Virtualization Methodologies to Facilitate NFV Deployment

    Sumbal Zahoor1, Ishtiaq Ahmad1, Ateeq Ur Rehman2, Elsayed Tag Eldin3, Nivin A. Ghamry4, Muhammad Shafiq5,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 311-329, 2023, DOI:10.32604/cmc.2023.035960

    Abstract The development of the Next-Generation Wireless Network (NGWN) is becoming a reality. To conduct specialized processes more, rapid network deployment has become essential. Methodologies like Network Function Virtualization (NFV), Software-Defined Networks (SDN), and cloud computing will be crucial in addressing various challenges that 5G networks will face, particularly adaptability, scalability, and reliability. The motivation behind this work is to confirm the function of virtualization and the capabilities offered by various virtualization platforms, including hypervisors, clouds, and containers, which will serve as a guide to dealing with the stimulating environment of 5G. This is particularly crucial More >

  • Open Access

    ARTICLE

    Transparent Access to Heterogeneous IoT Based on Virtual Resources

    Wenquan Jin1, Sunhwan Lim2, Young-Ho Suh2, Chanwon Park2, Dohyeun Kim3,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4983-4999, 2023, DOI:10.32604/cmc.2023.020851

    Abstract The Internet of Things (IoT) inspires industries to deploy a massive number of connected devices to provide smart and ubiquitous services to influence our daily life. Edge computing leverages sufficient computation and storage at the edge of the network to enable deploying complex functions closer to the environment using Internet-connected devices. According to the purpose of the environment including privacy level, domain functionality, network scale and service quality, various environment-specific services can be provided through heterogeneous applications with sensors and actuators based on edge computing. However, for providing user-friendly service scenarios based on the transparent… More >

  • Open Access

    ARTICLE

    SFC Design and VNF Placement Based on Traffic Volume Scaling and VNF Dependency in 5G Networks

    Zhihao Zeng*, Zixiang Xia, Xiaoning Zhang, Yexiao He

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.3, pp. 1791-1814, 2023, DOI:10.32604/cmes.2022.021648

    Abstract The development of Fifth-Generation (5G) mobile communication technology has remarkably promoted the spread of the Internet of Things (IoT) applications. As a promising paradigm for IoT, edge computing can process the amount of data generated by mobile intelligent devices in less time response. Network Function Virtualization (NFV) that decouples network functions from dedicated hardware is an important architecture to implement edge computing, deploying heterogeneous Virtual Network Functions (VNF) (such as computer vision, natural language processing, intelligent control, etc.) on the edge service nodes. With the NFV MANO (Management and Orchestration) framework, a Service Function Chain… More >

  • Open Access

    ARTICLE

    Randomized MILP framework for Securing Virtual Machines from Malware Attacks

    R. Mangalagowri1,*, Revathi Venkataraman2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1565-1580, 2023, DOI:10.32604/iasc.2023.026360

    Abstract Cloud computing involves remote server deployments with public network infrastructures that allow clients to access computational resources. Virtual Machines (VMs) are supplied on requests and launched without interactions from service providers. Intruders can target these servers and establish malicious connections on VMs for carrying out attacks on other clustered VMs. The existing system has issues with execution time and false-positive rates. Hence, the overall system performance is degraded considerably. The proposed approach is designed to eliminate Cross-VM side attacks and VM escape and hide the server’s position so that the opponent cannot track the target… More >

  • Open Access

    ARTICLE

    Resource Based Automatic Calibration System (RBACS) Using Kubernetes Framework

    Tahir Alyas1, Nadia Tabassum2, Muhammad Waseem Iqbal3,*, Abdullah S. Alshahrani4, Ahmed Alghamdi5, Syed Khuram Shahzad6

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1165-1179, 2023, DOI:10.32604/iasc.2023.028815

    Abstract Kubernetes, a container orchestrator for cloud-deployed applications, allows the application provider to scale automatically to match the fluctuating intensity of processing demand. Container cluster technology is used to encapsulate, isolate, and deploy applications, addressing the issue of low system reliability due to interlocking failures. Cloud-based platforms usually entail users define application resource supplies for eco container virtualization. There is a constant problem of over-service in data centers for cloud service providers. Higher operating costs and incompetent resource utilization can occur in a waste of resources. Kubernetes revolutionized the orchestration of the container in the cloud-native… More >

  • Open Access

    ARTICLE

    Enhanced Reliability in Network Function Virtualization by Hybrid Hexagon-Cost Efficient Algorithm

    D. Jeyakumar*, C. Rajabhushanam

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1131-1144, 2022, DOI:10.32604/csse.2022.022480

    Abstract In this,communication world, the Network Function Virtualization concept is utilized for many businesses, small services to virtualize the network node function and to build a block that may connect the chain, communication services. Mainly, Virtualized Network Function Forwarding Graph (VNF-FG) has been used to define the connection between the VNF and to give the best end-to-end services. In the existing method, VNF mapping and backup VNF were proposed but there was no profit and reliability improvement of the backup and mapping of the primary VNF. As a consequence, this paper offers a Hybrid Hexagon-Cost Efficient… More >

Displaying 1-10 on page 1 of 22. Per Page