The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This demo showcases some of the capabilities foreseen for the security infrastructure designed by the H2020 SHIELD project. SHIELD exploits NFV for adaptive monitoring of an IT infrastructure and for feeding the data to an analytics engine to detect attacks in real time. An intelligent reaction system is then activated to reconfigure the SDN/NFV infrastructure so that the attacks are thwarted. The...
Honeypots have been largely used to capture and investigate malicious behavior through deliberately sacrificing their own resources in order to be attacked. Hybrid honeypot architectures consisting of frontends and backends are widely used in the research area, specially due to the benefits of their high scalability and fidelity for detailed attacking data collection. A hybrid honeypot system often...
A service-oriented architecture (SOA)-based application is composed of a number of distributed and loosely-coupled services which are interconnected to accomplish a more complex functionality. The main security challenge in SOA is that we cannot trust the participating services in a service composition to behave as expected all the time. Moreover, the chain of all services involved in an end-to-end...
Linux containers present a lightweight solution to package applications into images and instantiate them in isolated environments. Such images may include vulnerabilities that can be exploited at runtime. A vulnerability scanning service can detect these vulnerabilities by periodically scanning the containers and their images for potential threats. When a threat is detected, an event may be generated...
Software Defined Security (SDS), which provides a flexible and centralized security solution, attracts many researchers to study the details of this conception. In this paper, a security controller-based SDS (SC-SDS) architecture is presented, in which a modularized security controller is placed in the control plane and interacts with other components through APIs. The security controller completes...
This paper takes advantage of the emerging multi-core computer architecture to design a general framework for mitigating network-based complexity attacks. In complexity attacks, an attacker carefully crafts “heavy” messages (or packets) such that each heavy message consumes substantially more resources than a normal message. Then, it sends a sufficient number of heavy messages to bring the system...
The OpenFlow paradigm embraces third-party development efforts, and therefore suffers from potential attacks that usurp the excessive privileges of control plane applications (apps). Such privilege abuse could lead to various attacks impacting the entire administrative domain. In this paper, we present SDNShield, a permission control system that helps network administrators to express and enforce...
This paper considers the quantitative measurementof information flow through a program -- the degree of influence a program's inputs can have over a set of specified program variables. This definition has been proposed as a refinement of taint analysis in the detection of a class of security flaws in programs. Unfortunately, the precise information flow by this definition is difficult to compute,...
Modern SoC designs incorporate several security policies to protect sensitive assets from unauthorized access. The policies affect multiple design blocks, and may involve subtle interactions between hardware, firmware, and software. This makes it difficult for SoC designers to implement these policies, and system validators to ensure adherence. Associated problems include complexity in upgrading these...
The threat of cyber-attacks grows up, as one can see by several negative security-news from companies and private persons. [7] Especially small-and-medium-sized enterprises (SME) are in focus of external attackers because they have not implemented sufficient security strategies and components for their networks yet. Additionally, tablets, smartphones, and netbooks changed the requirements of IT security...
Security by isolation is a longstanding, widely applied, and useful paradigm for achieving security goals such as data and code integrity, confidentiality, and availability. Security by isolation can be used to create Trusted Execution Environments. These environments provide specific security guarantees to the information processing taking place therein. In an Industrial Control System secure control...
Addressing security and privacy requirements for Mobile and Cloud platforms is always made in isolation. This lack of coherence has impacts when data are permanently travelling between such platforms. In this paper we propose a symmetric architecture that takes into account the privacy and security requirements of the two platforms and offers a straightforward instantiation pattern for realizing an...
Today our world is ready to make the maximum use of cloud computing facility as like other daily most common utilities such as electricity, gas and water. However, currently the cloud is showing its limited effect in case of utility service system. The main lacking in cloud is the absence of unified architecture for deploying service and use of application in an optimum way to make the maximum availability...
Along with the invention of computers and interconnected networks, physical societal notions like security, trust, and privacy entered the digital environment. The concept of digital environments begins with the trust (established in the real world) in the organisation/individual that manages the digital resources. This concept evolved to deal with the rapid growth of the Internet, where it became...
Cloud computing making ubiquitous influence in today's ever growing and on-demand IT world. Cloud delivers the next-generation computing paradigm that showcases the possibilities of apt resource sharing, true elasticity, and maximum resource utilization as compared to any of its early competitors. In addition to its technicality, corporates are also fascinated with its attractive tag of 'pay-as-you-use'...
Among the current information security prevention systems such as firewalls and intrusion detection systems, there exist several shortages such as alert overload, high false alarm rate, absence of effective alert management mechanism etc. As a result, there is a tremendous amount of alert data overload in the network, and this data could be redundant, irrelevant or meaningless. The result of this...
There is increasing interest in using terminal architectures capable of supporting multiple networks. A terminal that is episodically present on a network is a new situation for most Network Managers and for computer network defense needs. Likewise, having to accommodate interaction with multiple network managers is a different paradigm for the terminal. This paper discusses the kinds of node architecture...
Decentralized systems are systems-of-systems whose services are governed by two or more separate organizations under distinct spheres of authority. Coordinated evolution of the various elements of a decentralized system may be difficult, if not impossible, as individual organizations evolve their service offerings in response to organization- and service-specific pressures, including market demand,...
In this paper we introduce the architecture and system platform of a new regular expression processor for next generation security platforms for content awareness and network security processing. The paper first outlines the feature requirements of state-of-the-art network and security systems, then presents the proposed content processing system and processor architecture.
Representing commonality and variability in the software product line architectures requires extension of the existing representation mechanisms (RMs). Various RMs including Orthogonal Variability Model (OVM) or extensions of the UML notation have been proposed by the well-known software product line (SPL) engineering methods. However, there is no research that analyzes to what extent they can express...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.