Page 263 - Trust in ICT 2017
P. 263
Trust in ICT 5
b) Complexity of network operation
There are many algorithms for network resource optimization including efficient routing, congestion
avoidance, and guaranteeing quality of service and quality of experience. When the unpredictable situations
are happened in a network, the out-of-service possibility is increasing. Intentional attacks from outside (e.g.,
distributed denial-of-service attacks) are also a part of risks. While network control functions can arrange the
by-pass or de-tour route to cope with overflowed traffic, the unexpected side effects like traffic fluctuation
and domino effect may bring additional risks. To increase network survivability during network operation,
networking protocols and operations, administrations, maintenance, and provisioning functions should be
re-designed to be trustworthy. Moreover, when a network infrastructure includes a cloud platform with large
volume of storage and processing capabilities, network instability is not coming only from traffic congestion.
The operation of the cloud platform and high level applications are additional harmful sources to increase
network risks. The existing security functions including firewall and deep packet inspection may be replaced
to provide the certain level of trust, through the implementation by a trust gateway system and trust-
guaranteed network operations, administrations, and maintenance functions.
255