An architecture to manage security operations for digital service chains

作者: Matteo Repetto , Alessandro Carrega , Riccardo Rapuzzi

DOI: 10.1016/J.FUTURE.2020.08.044

关键词:

摘要: … the cloud and IoT in unified enterprise security solutions; … , eBPF programs can be loaded at run-time, without affecting the stability of the system, in a much more effective and secure …

参考文章(19)
Sumeet Dua, Xian Du, None, Data Mining and Machine Learning in Cybersecurity Auerbach Publications. ,(2011) , 10.1201/B10867
T. Aaron Gulliver, Fahad F. Alruwaili, SOCaaS: Security Operations Center as a Service for Cloud Computing Environments ieee international conference on cloud computing technology and science. ,vol. 3, pp. 87- 96 ,(2014)
Igino Corona, Giorgio Giacinto, Fabio Roli, Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues Information Sciences. ,vol. 239, pp. 201- 225 ,(2013) , 10.1016/J.INS.2013.03.022
N. Hoque, Monowar H. Bhuyan, R.C. Baishya, D.K. Bhattacharyya, J.K. Kalita, Network attacks Journal of Network and Computer Applications. ,vol. 40, pp. 307- 324 ,(2014) , 10.1016/J.JNCA.2013.08.001
Hamed Haddad Pajouh, GholamHossein Dastghaibyfard, Sattar Hashemi, Two-tier network anomaly detection model: a machine learning approach intelligent information systems. ,vol. 48, pp. 61- 74 ,(2017) , 10.1007/S10844-015-0388-X
Florian Skopik, Giuseppe Settanni, Roman Fiedler, A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing Computers & Security. ,vol. 60, pp. 154- 176 ,(2016) , 10.1016/J.COSE.2016.04.003
Giuseppe Settanni, Florian Skopik, Yegor Shovgenya, Roman Fiedler, Mark Carolan, Damien Conroy, Konstantin Boettinger, Mark Gall, Gerd Brost, Christophe Ponchel, Mirko Haustein, Helmut Kaufmann, Klaus Theuerkauf, Pia Olli, A collaborative cyber incident management system for European interconnected critical infrastructures workshop on information security applications. ,vol. 34, pp. 166- 182 ,(2017) , 10.1016/J.JISA.2016.05.005
D. Lopez, E. Lopez, L. Dunbar, J. Strassner, R. Kumar, Framework for Interface to Network Security Functions RFC. ,vol. 8329, pp. 1- 25 ,(2018) , 10.17487/RFC8329
Jean Sebastien Bedo, Salah Eddine El Ayoubi, Miltiadis Filippou, Anastasius Gavras, Domenico Giustiniano, Paola Iovanna, Antonio Manzalini, Olav Queseth, Theodoros Rokkas, Michael Surridge, Terje Tjelta, None, 5G innovations for new business opportunities Mobile World Congress. ,(2017)
S Hares, D Lopez, M Zarny, C Jacquenet, R Kumar, J Jeong, None, Interface to Network Security Functions (I2NSF): Problem Statement and Use Cases RFC. ,vol. 8192, pp. 1- 29 ,(2017)