The example of FIG. 2 may provide the following advantages compared to systems that do not dynamically instantiate vBNG instances. For example, one or more techniques described herein may provide an end-to-end solution for deployment, expansion, growth and management of edge (network subscribers), in the form of application which can be deployed in cloud. Such techniques may hide the complexity of deployment and day-to-day operations of numerous vBNG instances to a single centralized node. Such automation may help to remove admin/user intervention, to a great extent. In some examples, one or more techniques described herein may elastically increase/decrease vBNG instances, which may make the network itself (e.g., network system 10) more efficient by reducing needless execution of vBNG processes, saving processor cycles, bandwidth, and memory consumption, which promotes reduced power consumption. In some examples, one or more techniques described herein may provide automatic management and compounding solution for multiple vBNG instances. In some examples, one or more techniques described herein may provide a cost effective approach for service providers. In some examples, one or more techniques described herein may provide easy to deploy, easy to expand, agility for deploying new services. In some examples, one or more techniques described herein may provide, due in part to elasticity, an unlimited amount of scale, call setup rate, and/or resources. In some examples, one or more techniques described herein may provide an optimal use of resources with load balancing across the vBNG instances reduces the operational expenses (OPEX), which may make the network itself (e.g., network system 10) more efficient by reducing needless execution of vBNG processes, saving processor cycles, bandwidth, and memory consumption, which promotes reduced power consumption. In some examples, one or more techniques described herein may help to provide no network downtime. In some examples, one or more techniques described herein may provide automatic recovery of vBNG instance. In some examples, one or more techniques described herein may provide unified security and threat management. In some examples, one or more techniques described herein may provide intrusion detection and unified suspicious flow detection.