A novel approach for security function graph configuration and deployment