Catálogo de publicaciones - libros

Compartir en
redes sociales


Título de Acceso Abierto

Security of Networks and Services in an All-Connected World: Security of Networks and Services in an All-Connected World

Parte de: Lecture Notes in Computer Science

En conferencia: 11º IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS) . Zurich, Switzerland . July 10, 2017 - July 13, 2017

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

anomaly detection; artificial intelligence; cloud computing; data security; cyber crime; internet; network security; wireless; web

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No requiere 2017 Directory of Open access Books acceso abierto
No requiere 2017 SpringerLink acceso abierto

Información

Tipo de recurso:

libros

ISBN impreso

978-3-319-60773-3

ISBN electrónico

978-3-319-60774-0

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Tabla de contenidos

Flow-Based Detection of IPv6-specific Network Layer Attacks

Luuk Hendriks; Petr Velan; Ricardo de O. Schmidt; Pieter-Tjerk de Boer; Aiko Pras

With a vastly different header format, IPv6 introduces new vulnerabilities not possible in IPv4, potentially requiring new detection algorithms. While many attacks specific to IPv6 have proven to be possible and are described in the literature, no detection solutions for these attacks have been proposed. In this study we identify and characterise IPv6-specific attacks that can be detected using flow monitoring. By constructing flow-based signatures, detection can be performed using available technologies such as NetFlow and IPFIX. To validate our approach, we implemented these signatures in a prototype, monitoring two production networks and injecting attacks into the production traffic.

- Short Papers: Security, Intrusion Detection, and Configuration | Pp. 137-142

Towards a Hybrid Cloud Platform Using Apache Mesos

Noha Xue; Hårek Haugerud; Anis Yazidi

Hybrid cloud technology is becoming increasingly popular as it merges private and public clouds to bring the best of two worlds together. However, due to the heterogeneous cloud installation, facilitating a hybrid cloud setup is not simple. Despite the availability of some commercial solutions to build a hybrid cloud, an open source implementation is still unavailable. In this paper, we try to bridge the gap by providing an open source implementation by leveraging the power of Apache Mesos. We build a hybrid cloud on the top of multiple cloud platforms, private and public.

- Short Papers: Security, Intrusion Detection, and Configuration | Pp. 143-148

Visual Analytics for Network Security and Critical Infrastructures

Karolína Burská; Radek Ošlejšek

A comprehensive analysis of cyber attacks is important for better understanding of their nature and their origin. Providing a sufficient insight into such a vast amount of diverse (and sometimes seemingly unrelated) data is a task that is suitable neither for humans nor for fully automated algorithms alone. Not only a combination of the two approaches but also a continuous reasoning process that is capable of generating a sufficient knowledge base is indispensable for a better understanding of the events. Our research is focused on designing new exploratory methods and interactive visualizations in the context of network security. The knowledge generation loop is important for its ability to help analysts to refine the nature of the processes that continuously occur and to offer them a better insight into the network security related events. In this paper, we formulate the research questions that relate to the proposed solution.

- Short Papers: Security, Intrusion Detection, and Configuration | Pp. 149-152

Preserving Relations in Parallel Flow Data Processing

Tomáš Čejka; Martin Žádník

Network monitoring produces high volume of data that must be analyzed ideally in near real-time to support network security operations. It is possible to process the data using Big Data frameworks, however, such approach requires adaptation or complete redesign of processing tools to get the same results. This paper elaborates on a parallel processing based on splitting a stream of flow records. The goal is to create subsets of traffic that contain enough information for parallel anomaly detection. The paper describes a methodology based on so called witnesses that helps to scale up without any need to modify existing algorithms.

- Short Papers: Security, Intrusion Detection, and Configuration | Pp. 153-156

SmartDEMAP: A Smart Contract Deployment and Management Platform

Markus Knecht; Burkhard Stiller

Smart contracts on a blockchain behave exactly as specified by their code. To be sure that a smart contract behaves as expected, the end-user has to either analyze its code or trust a potentially anonymous developer or auditor to do so. This approach proposes a smart contract deployment and management platform that can execute development tools and code quality tools in a trusted way and uses this to reduce the trust required into the smart contract developer or auditor. Additionally, such a platform can provide new capabilities for developers aiding them in the creation of smart contracts.

- Ph.D. Track: Autonomic and Self-Management Solutions | Pp. 159-164

Optimizing the Integration of Agent-Based Cloud Orchestrators and Higher-Level Workloads

Merlijn Sebrechts; Gregory Van Seghbroeck; Filip De Turck

The flexibility of cloud computing has put significant strain on operations teams. Manually installing and configuring applications in the cloud simply isn’t an option anymore. Configuration management automation solves the issue of getting a single application into a certain state automatically and reliably. However, the issue of automatic dependency management between multiple applications is still an “open, hard problem” according to researchers at Google. Agent-based modeling and orchestration tools like Juju solve the issue of getting from zero to a working set of correctly clustered and connected frameworks. The shortcomings of these state-of-the-art tools are that they don’t provide efficient ways to model and orchestrate workloads running on top of these frameworks. This paper presents a number of ways to deploy and orchestrate workloads with Juju, compares their performance and overhead, and suggests how this overhead can be minimized.

- Ph.D. Track: Autonomic and Self-Management Solutions | Pp. 165-170

Situational Awareness: Detecting Critical Dependencies and Devices in a Network

Martin Laštovička; Pavel Čeleda

Large-scale networks consisting of thousands of connected devices are like a living organism, constantly changing and evolving. It is very difficult for a human administrator to orient in such environment and to react to emerging security threats. With such motivation, this PhD proposal aims to find new methods for automatic identification of devices, the services they provide, their dependencies and importance. The main focus of the proposal is to find novel approaches to building cyber situational awareness in an unknown network for the purpose of computer security incident response. Our research is at the initial phase and will contribute to a PhD thesis in four years.

- Ph.D. Track: Methods for the Protection of Infrastructure and Services | Pp. 173-178

A Framework for SFC Integrity in NFV Environments

Lucas Bondan; Tim Wauters; Bruno Volckaert; Filip De Turck; Lisandro Zambenedetti Granville

Industry and academia have increased the deployment of Network Functions Virtualization (NFV) on their environments, either for reducing expenditures or taking advantage of NFV flexibility for service provisioning. In NFV, Service Function Chainings (SFC) composed of Virtualized Network Functions (VNF) are defined to deliver services to different customers. Despite the advancements in SFC composition for service provisioning, there is still a lack of proposals for ensuring the integrity of NFV service delivery, detecting anomalies in SFC operation. Such anomalies could indicate a series of different threats, such as DDoS attacks, information leakage, and unauthorized access. In this PhD, we propose a framework composed of an SFC Integrity Module (SIM) for the standard NFV architecture, providing the integration of anomaly detection mechanisms to NFV orchestrators. We present recent results of this PhD regarding the implementation of an entropy-based anomaly detection mechanism using the SIM framework. The results presented in this paper are based on the execution of the proposed mechanism using a realistic SFC data set.

- Ph.D. Track: Methods for the Protection of Infrastructure and Services | Pp. 179-184

Multi-domain DDoS Mitigation Based on Blockchains

Bruno Rodrigues; Thomas Bocek; Burkhard Stiller

The exponential increase of the traffic volume makes Distributed Denial-of-Service (DDoS) attacks a top security threat to service providers. Existing DDoS defense mechanisms lack resources and flexibility to cope with attacks by themselves, and by utilizing other’s companies resources, the burden of the mitigation can be shared. Technologies as blockchain and smart contracts allow distributing attack information across multiple domains, while SDN (Software-Defined Networking) and NFV (Network Function Virtualization) enables to scale defense capabilities on demand for a single network domain. This proposal presents the design of a novel architecture combining these elements and introducing novel opportunities for flexible and efficient DDoS mitigation solutions across multiple domains.

- Ph.D. Track: Methods for the Protection of Infrastructure and Services | Pp. 185-190