Abstract:
A system, method, and computer program product are provided that utilize a decoy in response to a distributed denial of service attack in a communication network. In use, a distributed denial of service (DDoS) attack directed at one or more resources of a communication network is detected. Additionally, at least one first communication channel associated with the communication network that is subject to the DDoS attack is identified. Further, at least one second communication channel to implement functionality of the at least one first communication channel is initiated, while maintaining the at least one first communication channel subject to the DDoS attack to use as a decoy for the DDoS attack. Moreover, the at least one second communication channel is utilized to implement the functionality of the at least one first communication channel while the at least one first communication channel subject to the DDoS attack is used as the decoy for the DDoS attack.
Abstract:
According to one aspect of the present invention there is provided a system, method, and computer program product for deploying a plurality of virtual network function (VNF) instances in a communication network using network function virtualization (NFV-based network), where the network includes a plurality of computing-related units and communication links in-between, the method including: determining at least one performance value for at least one of the computing-related units and communication links, determining at least one performance requirement for at least one of the VNF instances, and associating the at least one VNF instance with at least one of the computing-related units and the communication links according to the at least one performance requirement and the at least one performance value.
Abstract:
A system, method, and computer program product are provided for managing hierarchy and optimization in network function virtualization based networks. In use, a first hardware unit of a plurality of hardware units associated with a network function virtualization (NFV) based communication network is identified, the first hardware unit being identified based on a first load characteristic associated with the first hardware unit. Further, a first virtual network function (VNF) instance associated with the first hardware unit is identified, the first VNF instance being associated with usage of at least one service. Additionally, at least one traffic route associated with the first VNF instance is identified, the at least one traffic route being associated with usage of the at least one service. Furthermore, a second hardware unit for handling at least a portion of a workload associated with the at least one service is identified, the second hardware unit being identified based on a second load characteristic associated with the second hardware unit, and the second hardware unit being capable of utilizing the at least one traffic route. Still yet, a second VNF instance is initiated in the second hardware unit. Moreover, at least part of the at least one service is migrated from the first VNF instance to the second VNF instance without disrupting the service.
Abstract:
A system, method, and computer program product are provided for testing composite services in a communication network utilizing test data. In use, test data is sent to a composition of virtual services to test at least a portion of the composition of virtual services, the composition of virtual services including at least one first virtual service and at least one second virtual service chained such that the test data is received by the at least one first virtual service and an output of the at least one first virtual service is input to the at least one second virtual service, and at least a portion of the test data being configured such that at least a portion of the output of the at least one first virtual service is the same as the test data input to the at least one first virtual service. Additionally, a first output is received from the at least one second virtual service, the first output including a result of the output of the at least one first virtual service being input to the at least one second virtual service. Further, the test data is sent as an input to at least one third virtual service, the at least one third virtual service including the same functionality as the at least one second virtual service. In addition, a second output is received from the at least one third virtual service, the second output including a result of the test data being input to the at least one third virtual service including the same functionality as the at least one second virtual service. Moreover, the first output from the at least one second virtual service is compared with the second output from the at least one third virtual service including the same functionality as the at least one second virtual service to test the at least a portion of the composition of virtual services.
Abstract:
According to one aspect of the present invention there is provided a system, method, and computer program product for recovering from a network failure in a communication network using network function virtualization (NFV-based network), the method including: selecting a first network component of the NFV-based network, detecting at least one probable failure of the first network component, identifying at least one virtual network function (VNF) instance using the first network component, selecting a second network component to be used by same VNF for replacing the VNF instance in the first network component when the first network component is faulty, and securing at least one resource of the second network component for the VNF.
Abstract:
A system, method, and computer program product are provided for providing security in a Network Function Virtualization based (NFV-based) communication network. In operation, a security attack is identified. Additionally, a first hardware unit attacked by the security attack is identified. Further, a hardware unit in which to initiate a security defense software program is identified. Moreover, the security defense software program is initiated in the identified hardware unit.
Abstract:
A system, method, and computer program product are provided for preserving service continuity in a Network Function Virtualization based (NFV-based) communication network. In use, a first virtual network function (VNF) instance associated with a first VNF in a first hardware unit in a Network Function Virtualization based (NFV-based) communication network is identified. Additionally, a second VNF instance on a second hardware unit is instantiated, the second VNF instance being compatible with the first VNF instance. Further, communication directed to the first VNF instance is diverted to the second VNF instance on the second hardware unit, in response to initiating the second VNF instance on a second hardware unit.
Abstract:
A system, method, and computer program product are provided for augmenting a physical network system utilizing a network function virtualization orchestrator (NFV-O). In use, data traffic is monitored utilizing a Network Function Virtualization Orchestrator (NFV-O) module associated with at least a portion of a physical network system, the NFV-O module being operable to manage data flow associated with one or more Virtual Network Functions (VNFs) and one or more physical elements of the physical network system. Additionally, it is determined whether flow of the data traffic should be modified based on at least one of a traffic load or a traffic type utilizing the NFV-O module integrated in the physical network system. Further, at least a portion of the data traffic is directed from at least one of the physical elements to at least one of the VNFs when it is determined that the flow of the data traffic should be modified.
Abstract:
According to one aspect of the present invention there is provided a system, method, and computer program product for communicating information in a communication network using network function virtualization (NFV-based communication network), the method including: sending a communication from a first entity of the NFV-based communication network, the first entity being a sender, and receiving the communication by a second entity of the NFV-based communication network, the second entity being a receiver, where the communication includes: an identification of the sender of the communication, and an identification of the receiver of the communication, an identification of a function associated with the NFV-based communication network, and an authorization associating one or more of the sender and the receiver with the function.
Abstract:
A system, method, and computer program product are provided for resource conversion in network function virtualization based networks. In use, a first resource of a first type is identified in a first hardware unit, the first resource at least potentially having insufficient availability and being associated with a Network Function Virtualization based (NFV-based) communication network. Additionally, a second resource of a second type is identified, the second resource being associated with the first hardware unit, the second resource being identified as sufficiently available. Further, a third resource of the first type is identified, the third resource being associated with a second hardware unit, the second hardware unit being associated with the second resource, the third resource being identified as sufficiently available.