Page 263 - Trust in ICT 2017
P. 263

Trust in ICT                                                5


            b)      Complexity of network operation

            There  are  many  algorithms  for  network  resource  optimization  including  efficient  routing,  congestion
            avoidance, and guaranteeing quality of service and quality of experience. When the unpredictable situations
            are happened in a network, the out-of-service possibility is increasing. Intentional attacks from outside (e.g.,
            distributed denial-of-service attacks) are also a part of risks. While network control functions can arrange the
            by-pass or de-tour route to cope with overflowed traffic, the unexpected side effects like traffic fluctuation
            and domino effect may bring additional risks. To increase network survivability during network operation,
            networking protocols and operations, administrations, maintenance, and provisioning functions should be
            re-designed to be trustworthy. Moreover, when a network infrastructure includes a cloud platform with large
            volume of storage and processing capabilities, network instability is not coming only from traffic congestion.
            The operation of the cloud platform and high level applications are additional harmful sources to increase
            network risks. The existing security functions including firewall and deep packet inspection may be replaced
            to  provide  the  certain  level  of  trust,  through  the  implementation  by  a trust  gateway  system  and  trust-
            guaranteed network operations, administrations, and maintenance functions.




































































                                                                                                         255
   258   259   260   261   262   263   264   265   266   267   268