1000/1000
Hot
Most Recent
Low-speed internet can negatively impact incident response by causing delayed detection, ineffective response, poor collaboration, inaccurate analysis, and increased risk. Slow internet speeds can delay the receipt and analysis of data, making it difficult for security teams to access the relevant information and take action, leading to a fragmented and inadequate response. All of these factors can increase the risk of data breaches and other security incidents and their impact on IoT-enabled communication.
Related Works | Solutions | Characteristics | Limitations |
---|---|---|---|
Rani et al. [13] | Machine learning-basedintrusion detection system forsoftware-defined networking | Predicts network traffic andoptimizes network performance | Requires a large amountof data to train the algorithms |
Ahmed et al. [14] | A survey on networkvirtualization techniques andchallenges | Provides a comprehensive overview ofnetwork virtualization techniques andtheir potential benefits inimproving network performance,flexibility, and management | The proposed solutions maynot be applicable to allnetwork virtualization scenarios |
Wang and Zhao [15] | A survey of mobile edgeComputing for the Metaverse:architectures, applications, and challenges | Reduces latency and bandwidthrequirements and improves networkperformance | Limited processing power andstorage capacity at thenetwork edge |
Karakus and Durresi [16] | Quality of service (QoS)in software-defined networkingsurvey | Prioritizes network traffic andallocates bandwidth more effectively | Complexity in designing andimplementing QoS policies |
Li et al. [17] | BlockCSDN:blockchain-based collaborativeintrusion detection insoftware-defined networking | Decentralized and tamper-proofrecord of network activity andimproved network security | High computational overheadand scalability issues |
Yang et al. [18] | Advances in resource allocationin network function virtualization | Generalized and examined fourtypical resource allocation issuesfor QoS improvement and delaycalculation | The proposed solutions maynot be applicable to allNFV scenarios |
Xu et al. [19] | Hybrid cloud computing:state-of-the-art, challenges,and future directions | Improves the security, privacy,and performance of hybridcloud systems | Requires additional resources andexpertise to implement andmaintain |
Basu et al. [20] | QoS-aware dynamic networkslicing and VNF embeddingin softwarized 5G networks | Offers significant benefits interms of energy-efficientservice delivery, low latency,and optimized network efficiency | The MILP-based optimizationapproach may pose computationalchallenges in larger networkscenarios, and the approachmay require further validationin real-world deployments |
Kim and Kim [21] | VNF placement methodbased on VNF Characteristics | Efficient VNF placement usinginformation about the resources of eachnode, which can lead to improvednetwork performance and resourceutilization | Increased complexity in termsof resource monitoring andupdating, as well as potentialscalability issues if thenumber of nodes and VNFsincrease significantly |
Taniguchfi and Shinomiya [22] | A method of service functionchain configuration to minimizecomputing and network resourcesfor VNF failures | Reduces the computing resourcesrequired for SFC configurationcompared to previous studies,which can lead to cost savingsfor network operators | The proposed method maynot be suitable for alltypes of virtualized networks,and further research isneeded to evaluate itseffectiveness in different contexts |
Yao et al. [23] | Anomaly-based approach forIoT | This approach improves the detectionaccuracy and reduces false positives.The main advantage of this approachis its ability to detect both knownand unknown attacks | Potential for higher resourceconsumption due to running multipledetection methods simultaneously |
Zheng et al. [24] | Network firewall for cybersecurity in an IoT environment | The approach improves securityand reduces the potential for falsepositives. The main advantage of thisapproach is its ability to adaptto changing network conditions | The potential for higher resourceconsumption due to continuousanalysis and rule updates |
Our Work | VNFSDN | Improved network performance andscalability and increased networkefficiency | Increased complexity andmanagement overhead due to theneed for specialized skills andtools to manage the virtualizednetwork functions |