Catálogo de publicaciones - libros
Título de Acceso Abierto
Security of Networks and Services in an All-Connected World: Security of Networks and Services in an All-Connected World
Parte de: Lecture Notes in Computer Science
En conferencia: 11º IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS) . Zurich, Switzerland . July 10, 2017 - July 13, 2017
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
anomaly detection; artificial intelligence; cloud computing; data security; cyber crime; internet; network security; wireless; web
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No requiere | 2017 | Directory of Open access Books | ||
No requiere | 2017 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-319-60773-3
ISBN electrónico
978-3-319-60774-0
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2017
Tabla de contenidos
Flow-Based Detection of IPv6-specific Network Layer Attacks
Luuk Hendriks; Petr Velan; Ricardo de O. Schmidt; Pieter-Tjerk de Boer; Aiko Pras
With a vastly different header format, IPv6 introduces new vulnerabilities not possible in IPv4, potentially requiring new detection algorithms. While many attacks specific to IPv6 have proven to be possible and are described in the literature, no detection solutions for these attacks have been proposed. In this study we identify and characterise IPv6-specific attacks that can be detected using flow monitoring. By constructing flow-based signatures, detection can be performed using available technologies such as NetFlow and IPFIX. To validate our approach, we implemented these signatures in a prototype, monitoring two production networks and injecting attacks into the production traffic.
- Short Papers: Security, Intrusion Detection, and Configuration | Pp. 137-142
Towards a Hybrid Cloud Platform Using Apache Mesos
Noha Xue; Hårek Haugerud; Anis Yazidi
Hybrid cloud technology is becoming increasingly popular as it merges private and public clouds to bring the best of two worlds together. However, due to the heterogeneous cloud installation, facilitating a hybrid cloud setup is not simple. Despite the availability of some commercial solutions to build a hybrid cloud, an open source implementation is still unavailable. In this paper, we try to bridge the gap by providing an open source implementation by leveraging the power of Apache Mesos. We build a hybrid cloud on the top of multiple cloud platforms, private and public.
- Short Papers: Security, Intrusion Detection, and Configuration | Pp. 143-148
Visual Analytics for Network Security and Critical Infrastructures
Karolína Burská; Radek Ošlejšek
A comprehensive analysis of cyber attacks is important for better understanding of their nature and their origin. Providing a sufficient insight into such a vast amount of diverse (and sometimes seemingly unrelated) data is a task that is suitable neither for humans nor for fully automated algorithms alone. Not only a combination of the two approaches but also a continuous reasoning process that is capable of generating a sufficient knowledge base is indispensable for a better understanding of the events. Our research is focused on designing new exploratory methods and interactive visualizations in the context of network security. The knowledge generation loop is important for its ability to help analysts to refine the nature of the processes that continuously occur and to offer them a better insight into the network security related events. In this paper, we formulate the research questions that relate to the proposed solution.
- Short Papers: Security, Intrusion Detection, and Configuration | Pp. 149-152
Preserving Relations in Parallel Flow Data Processing
Tomáš Čejka; Martin Žádník
Network monitoring produces high volume of data that must be analyzed ideally in near real-time to support network security operations. It is possible to process the data using Big Data frameworks, however, such approach requires adaptation or complete redesign of processing tools to get the same results. This paper elaborates on a parallel processing based on splitting a stream of flow records. The goal is to create subsets of traffic that contain enough information for parallel anomaly detection. The paper describes a methodology based on so called witnesses that helps to scale up without any need to modify existing algorithms.
- Short Papers: Security, Intrusion Detection, and Configuration | Pp. 153-156
SmartDEMAP: A Smart Contract Deployment and Management Platform
Markus Knecht; Burkhard Stiller
Smart contracts on a blockchain behave exactly as specified by their code. To be sure that a smart contract behaves as expected, the end-user has to either analyze its code or trust a potentially anonymous developer or auditor to do so. This approach proposes a smart contract deployment and management platform that can execute development tools and code quality tools in a trusted way and uses this to reduce the trust required into the smart contract developer or auditor. Additionally, such a platform can provide new capabilities for developers aiding them in the creation of smart contracts.
- Ph.D. Track: Autonomic and Self-Management Solutions | Pp. 159-164
Optimizing the Integration of Agent-Based Cloud Orchestrators and Higher-Level Workloads
Merlijn Sebrechts; Gregory Van Seghbroeck; Filip De Turck
The flexibility of cloud computing has put significant strain on operations teams. Manually installing and configuring applications in the cloud simply isn’t an option anymore. Configuration management automation solves the issue of getting a single application into a certain state automatically and reliably. However, the issue of automatic dependency management between multiple applications is still an “open, hard problem” according to researchers at Google. Agent-based modeling and orchestration tools like Juju solve the issue of getting from zero to a working set of correctly clustered and connected frameworks. The shortcomings of these state-of-the-art tools are that they don’t provide efficient ways to model and orchestrate workloads running on top of these frameworks. This paper presents a number of ways to deploy and orchestrate workloads with Juju, compares their performance and overhead, and suggests how this overhead can be minimized.
- Ph.D. Track: Autonomic and Self-Management Solutions | Pp. 165-170
Situational Awareness: Detecting Critical Dependencies and Devices in a Network
Martin Laštovička; Pavel Čeleda
Large-scale networks consisting of thousands of connected devices are like a living organism, constantly changing and evolving. It is very difficult for a human administrator to orient in such environment and to react to emerging security threats. With such motivation, this PhD proposal aims to find new methods for automatic identification of devices, the services they provide, their dependencies and importance. The main focus of the proposal is to find novel approaches to building cyber situational awareness in an unknown network for the purpose of computer security incident response. Our research is at the initial phase and will contribute to a PhD thesis in four years.
- Ph.D. Track: Methods for the Protection of Infrastructure and Services | Pp. 173-178
A Framework for SFC Integrity in NFV Environments
Lucas Bondan; Tim Wauters; Bruno Volckaert; Filip De Turck; Lisandro Zambenedetti Granville
Industry and academia have increased the deployment of Network Functions Virtualization (NFV) on their environments, either for reducing expenditures or taking advantage of NFV flexibility for service provisioning. In NFV, Service Function Chainings (SFC) composed of Virtualized Network Functions (VNF) are defined to deliver services to different customers. Despite the advancements in SFC composition for service provisioning, there is still a lack of proposals for ensuring the integrity of NFV service delivery, detecting anomalies in SFC operation. Such anomalies could indicate a series of different threats, such as DDoS attacks, information leakage, and unauthorized access. In this PhD, we propose a framework composed of an SFC Integrity Module (SIM) for the standard NFV architecture, providing the integration of anomaly detection mechanisms to NFV orchestrators. We present recent results of this PhD regarding the implementation of an entropy-based anomaly detection mechanism using the SIM framework. The results presented in this paper are based on the execution of the proposed mechanism using a realistic SFC data set.
- Ph.D. Track: Methods for the Protection of Infrastructure and Services | Pp. 179-184
Multi-domain DDoS Mitigation Based on Blockchains
Bruno Rodrigues; Thomas Bocek; Burkhard Stiller
The exponential increase of the traffic volume makes Distributed Denial-of-Service (DDoS) attacks a top security threat to service providers. Existing DDoS defense mechanisms lack resources and flexibility to cope with attacks by themselves, and by utilizing other’s companies resources, the burden of the mitigation can be shared. Technologies as blockchain and smart contracts allow distributing attack information across multiple domains, while SDN (Software-Defined Networking) and NFV (Network Function Virtualization) enables to scale defense capabilities on demand for a single network domain. This proposal presents the design of a novel architecture combining these elements and introducing novel opportunities for flexible and efficient DDoS mitigation solutions across multiple domains.
- Ph.D. Track: Methods for the Protection of Infrastructure and Services | Pp. 185-190