Increasing Internet Capacity Using Local Search
Computational Optimization and Applications
A survey of network virtualization
Computer Networks: The International Journal of Computer and Telecommunications Networking
Reliable adaptive multipath provisioning with bandwidth and differential delay constraints
INFOCOM'10 Proceedings of the 29th conference on Information communications
Designing and embedding reliable virtual infrastructures
Proceedings of the second ACM SIGCOMM workshop on Virtualized infrastructure systems and architectures
Adaptive virtual network provisioning
Proceedings of the second ACM SIGCOMM workshop on Virtualized infrastructure systems and architectures
Resilient Virtual Network Service Provision in Network Virtualization Environments
ICPADS '10 Proceedings of the 2010 IEEE 16th International Conference on Parallel and Distributed Systems
Survivable multipath provisioning with differential delay constraint in telecom mesh networks
IEEE/ACM Transactions on Networking (TON)
Survivable virtual network embedding
NETWORKING'10 Proceedings of the 9th IFIP TC 6 international conference on Networking
Virtual network embedding through topology awareness and optimization
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Network virtualization can potentially limit the impact of attacks by isolating traffic from different networks. However, routers and links are still vulnerable to attacks on the underlying network. Specifically, should a physical link be compromised, all embedded virtual links will be affected. Previous work protects virtual networks by setting aside backup resources. Although effective, this solution tends to be expensive as backup resources usually remain idle. In this paper, we present a novel virtual network allocation approach which explores the trade-off between resilience to attacks and efficiency in resource utilization. Our approach is composed of two complementary strategies, one preventive and the other reactive. The former embeds virtual links into multiple substrate paths, while the latter attempts to reallocate any capacity affected by an underlying DoS attack. Both strategies are modeled as optimization problems. Numerical results show the level of resilience to attacks and the low cost demanded by our approach.