Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Deployment-driven Security Configuration for Virtual Networks

Published

Author(s)

Ramaswamy Chandramouli

Abstract

Virtualized Infrastructures are increasingly deployed in many data centers. One of the key components of this virtualized infrastructure is the virtual network - a software-defined communication fabric that links together the various Virtual Machines (VMs) to each other and to the physical host on which the VMs reside. Because of its key role in providing connectivity among VMs and the applications hosted on them, Virtual Networks have to be securely configured to provide the foundation for the overall security of the virtualized infrastructure in any deployment scenario. The objective of this paper is to illustrate a deployment-driven methodology for deriving a security configuration for Virtual Networks. The methodology outlines two typical deployment scenarios, identifies use cases and their associated security requirements, the security solutions to meet those requirements, the virtual network security configuration to implement each security solution and then analyzes the pros and cons of each security solution.
Volume
4
Conference Dates
December 27-28, 2014
Conference Location
Chennai
Conference Title
6th International Conference on Networks & Communications (NETCOM 2014)

Keywords

security configuration, software defined network, virtual machine, virtualized infrastructure

Citation

Chandramouli, R. (2014), Deployment-driven Security Configuration for Virtual Networks, 6th International Conference on Networks & Communications (NETCOM 2014), Chennai, -1, [online], https://doi.org/10.5121/csit.2014.41301 (Accessed December 26, 2024)

Issues

If you have any questions about this publication or are having problems accessing it, please contact reflib@nist.gov.

Created December 28, 2014, Updated November 10, 2018