dc.contributor.advisor | Leeney, Dr. Mark | en |
dc.contributor.author | Harvey, Darren | en |
dc.date.accessioned | 2017-03-21T14:05:05Z | |
dc.date.available | 2017-03-21T14:05:05Z | |
dc.date.issued | 2015-01 | |
dc.identifier.other | Master of Science in Computing | en |
dc.identifier.uri | https://research.thea.ie/handle/20.500.12065/1191 | |
dc.description.abstract | A fundamental function of almost any network is to ensure that certain types of traffic are kept isolated from other traffic in the network. With multi-tenant environments such as datacentres and the cloud providing isolation between traffic, and in particular, tenant traffic is even more crucial than ever before. Incorporating isolation also helps provide an additional level of security to traffic in the network. But with the rapid change of network architectures over the past decade from physical to virtual environments, providing isolation is not so straightforward.
With the creation of virtualization and virtual networks an investigation into whether isolation can be incorporated into virtual environments as effectively as they can be into physical environments provides the basis for this research. The purpose of this paper is to present a comprehensive investigation into incorporating different isolation techniques into various types of virtual environments. This work will explore and evaluate these isolation techniques and describe how effective each of the isolation techniques incorporated are when integrated into multi-tenant virtual networking environments. In an attempt to determine the effectiveness of each of the isolation methods three experiments were carried out which incorporates three different isolation techniques into different virtual environments to determine the effectiveness of each method.
The results demonstrates that isolation techniques can be incorporated into virtual environments just as effectively as they can be into traditional networks. However, as virtualization is still a relatively new paradigm the results do raise the question as to whether enough is known about the different types of virtual environments such as SDN’s and the attack vectors associated with these environments. Due to these reservations it is evident that further investigation and exploration is required. | en |
dc.format | PDF | en |
dc.language.iso | en | en |
dc.subject | Computer networks traffic | en |
dc.subject | Virtual environments | en |
dc.title | Traffic isolation techniques in securing multi-tenant virtual environments | en |
dc.type | Master Thesis (taught) | en |
dc.publisher.institution | Letterkenny Institute of Technology | en |
dc.subject.department | Computing | en |