Catálogo de publicaciones - libros
Título de Acceso Abierto
Security of Networks and Services in an All-Connected World: Security of Networks and Services in an All-Connected World
Parte de: Lecture Notes in Computer Science
En conferencia: 11º IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS) . Zurich, Switzerland . July 10, 2017 - July 13, 2017
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
anomaly detection; artificial intelligence; cloud computing; data security; cyber crime; internet; network security; wireless; web
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No requiere | 2017 | Directory of Open access Books | ||
No requiere | 2017 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-319-60773-3
ISBN electrónico
978-3-319-60774-0
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2017
Tabla de contenidos
Making Flow-Based Security Detection Parallel
Marek Švepeš; Tomáš Čejka
Flow based monitoring is currently a standard approach suitable for large networks of ISP size. The main advantage of flow processing is a smaller amount of data due to aggregation. There are many reasons (such as huge volume of transferred data, attacks represented by many flow records) to develop scalable systems that can process flow data in parallel. This paper deals with splitting a stream of flow data in order to perform parallel anomaly detection on distributed computational nodes. Flow data distribution is focused not only on uniformity but mainly on successful detection. The results of an experimental analysis show that the proposed approach does not break important semantic relations between individual flow records and therefore it preserves detection results. All experiments were performed using real data traces from Czech National Education and Research Network.
- Security Management | Pp. 3-15
A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts
Bruno Rodrigues; Thomas Bocek; Andri Lareida; David Hausheer; Sina Rafati; Burkhard Stiller
The rapid growth in the number of insecure portable and stationary devices and the exponential increase of traffic volume makes Distributed Denial-of-Service (DDoS) attacks a top security threat to services provisioning. Existing defense mechanisms lack resources and flexibility to cope with attacks by themselves, and by utilizing other’s companies resources, the burden of the mitigation can be shared. Emerging technologies such as blockchain and smart contracts allows for the sharing of attack information in a fully distributed and automated fashion. In this paper, the design of a novel architecture is proposed by combining these technologies introducing new opportunities for flexible and efficient DDoS mitigation solutions across multiple domains. Main advantages are the deployment of an already existing public and distributed infrastructure to advertise white or blacklisted IP addresses, and the usage of such infrastructure as an additional security mechanism to existing DDoS defense systems, without the need to build specialized registries or other distribution mechanisms, which enables the enforcement of rules across multiple domains.
- Security Management | Pp. 16-29
Achieving Reproducible Network Environments with INSALATA
Nadine Herold; Matthias Wachs; Marko Dorfhuber; Christoph Rudolf; Stefan Liebald; Georg Carle
Analyzing network environments for security flaws and assessing new service and infrastructure configurations in general are dangerous and error-prone when done in operational networks. Therefore, such networks into a dedicated test environment is beneficial for comprehensive testing and analysis without impacting the operational network. To automate this reproduction of a network environment in a physical or virtualized testbed, several key features are required: (a) a suitable network model to describe network environments, (b) an automated acquisition process to instantiate this model for the respective network environment, and (c) an automated setup process to deploy the instance to the testbed.
With this work, we present INSALATA, an automated and extensible framework to reproduce physical or virtualized network environments in network testbeds. INSALATA employs a modular approach for data acquisition and deployment, resolves interdependencies in the setup process, and supports just-in-time reproduction of network environments. INSALATA is open source and available on Github. To highlight its applicability, we present a real world case study utilizing INSALATA.
- Security Management | Pp. 30-44
Towards a Software-Defined Security Framework for Supporting Distributed Cloud
Maxime Compastié; Rémi Badonnel; Olivier Festor; Ruan He; Mohamed Kassi-Lahlou
Cloud computing provides new facilities for building elaborated services hosted through various infrastructures over the Internet. In the meantime, these ones pose new important challenges in terms of security due to their intrinsic nature. We propose in this paper to detail a software-defined security framework supporting the protection of these services, in the context of distributed cloud. These ones require security mechanisms able to cope with their multi-tenancy and multi-cloud properties. The foundations of this framework rely on the software-defined logic to express and propagate security policies to the considered cloud resources, and on the autonomic paradigm to dynamically configure and adjust these mechanisms to distributed cloud constraints. In particular, we describe the main components and protocols of this software-defined security framework, evaluate this one and discuss implementation considerations, through the analysis of different realistic scenarios.
- Management of Cloud Environments and Services | Pp. 47-61
Optimal Service Function Chain Composition in Network Functions Virtualization
Andrés F. Ocampo; Juliver Gil-Herrera; Pedro H. Isolani; Miguel C. Neves; Juan F. Botero; Steven Latré; Lisandro Zambenedetti; Marinho P. Barcellos; Luciano P. Gaspary
Network Functions Virtualization (NFV) is an emerging initiative where virtualization is used to consolidate Network Functions (NFs) onto high volume servers (HVS), switches, and storage. In addition, NFV provides flexibility as Virtual Network Functions (VNFs) can be moved to different locations in the network. One of the major challenges of NFV is the allocation of demanded network services in the network infrastructures, commonly referred to as the Network Functions Virtualization - Resource Allocation (NFV-RA) problem. NFV-RA is divided into three stages: (i) Service Function Chain (SFC) composition, (ii) SFC embedding and (iii) SFC scheduling. Up to now, existing NFV-RA approaches have mostly tackled the SFC embedding stage taking the SFC composition as an assumption. Few approaches have faced the composition of the SFCs using heuristic approaches that do not guarantee optimal solutions. In this paper, we solve the first stage of the problem by characterizing the service requests in terms of NFs and optimally building the SFC using an Integer Linear Programming (ILP) approach.
- Management of Cloud Environments and Services | Pp. 62-76
An Optimized Resilient Advance Bandwidth Scheduling for Media Delivery Services
Maryam Barshan; Hendrik Moens; Bruno Volckaert; Filip De Turck
In IP-based media delivery services, we often deal with predictable network load and traffic, making it beneficial to use advance reservations even when network failure occurs. In such a network, to offer reliable reservations, fault-tolerance related features should be incorporated in the advance reservation system. In this paper, we propose an optimized protection mechanism in which backup paths are selected in advance to protect the transfers when any failure happens in the network. Using a shared backup path protection, the proposed approach minimizes the backup capacity of the requests while guaranteeing 100% single link failure recovery. We have evaluated the quality and complexity of our proposed solution and the impact of different percentages of backup demands and timeslot sizes have been investigated in depth. The presented approach has been compared to our previously-designed algorithm as a baseline. Our simulation results reveal a noticeable improvement in request acceptance rate, up to 9.2%. Moreover, with fine-grained timeslot sizes and under limited network capacity, the time complexity of the proposed solution is up to 14% lower.
- Evaluation and Experimental Study of Rich Network Services | Pp. 79-93
The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications
Lisa Kristiana; Corinna Schmitt; Burkhard Stiller
Due to the high mobility behavior in inter-vehicle communications (IVC), packet forwarding among vehicles becomes an important issue. For IVC in a traditional packet forwarding setting, it was observed that the ratio between packets received and the packets transmitted is often very low, sometimes less than 50%. This ratio is highly influenced by the environment, especially by road topologies and obstructions (., buildings or overpasses). Further influences encompass the number of driving vehicles on streets offering burdens for the IVC as well as serving as relay candidates. In order to improve IVC this paper introduces a Vehicular-to-Vehicular Urban Network (V2VUNet) to overcome inevitable obstructions and frequent network changes by selecting the best relay candidate. The V2VUNet implemented was evaluated in an IVC with the focus on three-dimensional road topologies including overpasses with a different number of driving lanes. The result shows that the developed V2VUNet provides about 30% better packet transmission performance compared to traditional packet transmission in IVC.
- Evaluation and Experimental Study of Rich Network Services | Pp. 94-107
Towards Internet Scale Quality-of-Experience Measurement with Twitter
Dennis Kergl; Robert Roedler; Gabi Dreo Rodosek
At present, Quality of Experience (QoE) measurements are accomplished by interrogating users for the perceived quality of a service they just have used. Influenced by many factors and often limited by domain or geographical region, this technique has several drawbacks when a general state of QoE for the internet as a whole is prospected. To achieve such a general metric, we leverage user complaints that we observe in real-time in social media. Such approaches have been successfully applied for the monitoring of specific and single services. We aim to extend existing methods in order to create an overall metric, define an internet wide QoE baseline, monitor changes and hence, provide a context for assessing smaller scale findings against a ground truth. The contribution of this work is to demonstrate the feasibility of using social media analysis for generating a meaningful value for quantifying the actual QoE of the internet.
- Evaluation and Experimental Study of Rich Network Services | Pp. 108-122
Hunting SIP Authentication Attacks Efficiently
Tomáš Jansky; Tomáš Čejka; Václav Bartoš
Extended flow records with application layer (L7) information allow for detection of various types of malicious traffic. Voice over IP (VoIP) is an example of technology that works on L7 and many attacks against it cannot be reliably detected using just basic flow information. Session Initiation Protocol (SIP), which is commonly used for VoIP signalling, is a frequent target of many types of attacks. This paper proposes and evaluates a novel algorithm for near real time detection of username scanning and password guessing attacks on SIP servers. The detection is based on analysis of L7 extended flow records.
- Short Papers: Security, Intrusion Detection, and Configuration | Pp. 125-130
MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks
Robert Müller; Marcel Waldvogel; Corinna Schmitt
Today most used devices are connected with each other building the Internet of Things (IoT). A variety of protocols are used depending on the underlying network infrastructure, application (e.g., Smart City, eHealth), and device capability. The judgment of the security feeling of the data sharing depends on personal settings (e.g., easy to use, encrypted transmission, anonymization support). MoDeNA – a Mobile Device Network Assistant – was developed offering an opportunity for understanding the judgment of security by bringing the user’s concerns and their technology understanding of used devices and protocols into relation. MoDeNA provides a transparent overview over the used wireless security of the user’s device giving concrete advices for improving the connection security and usability of mobile device security.
- Short Papers: Security, Intrusion Detection, and Configuration | Pp. 131-136