• A Proof-of-Concept Demonstration of Isolated and Encrypted Service Function Chains 

      Gunleifsen, Håkon; Kemmerich, Thomas; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      ontemporary Service Function Chaining (SFC), and the requirements arising from privacy concerns, call for the increasing integration of security features such as encryption and isolation across Network Function Virtualisation ...
    • A Tiered Control Plane Model for Service Function Chaining Isolation 

      Gunleifsen, Håkon; Gkioulos, Vasileios; Kemmerich, Thomas (Journal article; Peer reviewed, 2018)
      This article presents an architecture for encryption automation in interconnected Network Function Virtualization (NFV) domains. Current NFV implementations are designed for deployment within trusted domains, where overlay ...
    • Dynamic setup of IPsec VPNs in service function chaining 

      Gunleifsen, Håkon; Kemmerich, Thomas; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      This article describes a novel mechanism for the automated establishment of dynamic Virtual Private Networks (VPN) in the application domain of Network Function Virtualization (NFV). Each hop in an NFV Service Function ...
    • Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm 

      Çakmakçı, Salva Daneshgadeh; Kemmerich, Thomas; Ahmed, Tarem; Baykal, Nazife (Peer reviewed; Journal article, 2020)
      Distributed denial-of-service (DDoS) attacks are constantly evolving as the computer and networking technologies and attackers' motivations are changing. In recent years, several supervised DDoS detection algorithms have ...
    • Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm 

      Çakmakçı, Salva Daneshgadeh; Kemmerich, Thomas; Ahmed, Tarem; Baykal, Nazife (Peer reviewed; Journal article, 2020)
      Distributed denial-of-service (DDoS) attacks are constantly evolving as the computer and networking technologies and attackers' motivations are changing. In recent years, several supervised DDoS detection algorithms have ...