Towards a fully automated and optimized network security functions orchestration. Bringhenti, D., Marchetto, G., Sisto, R., Valenza, F., & Yusupov, J. In Proceedings of the 4th International Conference on Computing, Communications and Security (ICCCS 2019), pages 1–7, 2019. IEEE.
Paper doi abstract bibtex 5 downloads Automated policy-based network security management tools represent a new research frontier to be fully explored, so as to reduce the number of human errors due to a manual and suboptimal configuration of security services. Moreover, the agility that an automated tool would require can be provided by the most recent networking technologies, Network Functions Virtualization and Software-Defined Networking, which move the network management from the hardware level to the software. However, even though a Security Automation approach is nowadays feasible and would bring several benefits in facing cybersecurity attacks, pending problems are that currently only a limited number of automatic management tools have been developed and that they do not have a direct integration with cloud orchestrators, consequently requiring human interaction. Given these considerations, in this paper we propose a novel framework, whose goal is to automatically and optimally allocate and conFigure security functions in a virtualized network service in a formal and verified way, directly integrated in cloud orchestrators. We validated this contribution through an implementation that is able to cooperate with two well-known orchestrators, that are Open Baton and Kubernetes. © 2019 IEEE.
@InProceedings{2019ICCCS,
author = {Daniele Bringhenti and Guido Marchetto and Riccardo Sisto and Fulvio Valenza and Jalolliddin Yusupov},
booktitle = {Proceedings of the 4th International Conference on Computing, Communications and Security ({ICCCS} 2019)},
doi = {10.1109/CCCS.2019.8888130},
pages = {1--7},
publisher = {{IEEE}},
title = {Towards a fully automated and optimized network security functions orchestration},
year = {2019},
abstract={Automated policy-based network security management tools represent a new research frontier to be fully explored, so as to reduce the number of human errors due to a manual and suboptimal configuration of security services. Moreover, the agility that an automated tool would require can be provided by the most recent networking technologies, Network Functions Virtualization and Software-Defined Networking, which move the network management from the hardware level to the software. However, even though a Security Automation approach is nowadays feasible and would bring several benefits in facing cybersecurity attacks, pending problems are that currently only a limited number of automatic management tools have been developed and that they do not have a direct integration with cloud orchestrators, consequently requiring human interaction. Given these considerations, in this paper we propose a novel framework, whose goal is to automatically and optimally allocate and conFigure security functions in a virtualized network service in a formal and verified way, directly integrated in cloud orchestrators. We validated this contribution through an implementation that is able to cooperate with two well-known orchestrators, that are Open Baton and Kubernetes. © 2019 IEEE.},
keywords={Security Orchestration},
url = {https://iris.polito.it/retrieve/handle/11583/2753692/313520/main-2.pdf},
}
Downloads: 5
{"_id":"XBPARQf5jWFQwBgw4","bibbaseid":"bringhenti-marchetto-sisto-valenza-yusupov-towardsafullyautomatedandoptimizednetworksecurityfunctionsorchestration-2019","authorIDs":["anJrBcCdr4LzzWetx","x5vNTEJ4s3raTsibp"],"author_short":["Bringhenti, D.","Marchetto, G.","Sisto, R.","Valenza, F.","Yusupov, J."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Daniele"],"propositions":[],"lastnames":["Bringhenti"],"suffixes":[]},{"firstnames":["Guido"],"propositions":[],"lastnames":["Marchetto"],"suffixes":[]},{"firstnames":["Riccardo"],"propositions":[],"lastnames":["Sisto"],"suffixes":[]},{"firstnames":["Fulvio"],"propositions":[],"lastnames":["Valenza"],"suffixes":[]},{"firstnames":["Jalolliddin"],"propositions":[],"lastnames":["Yusupov"],"suffixes":[]}],"booktitle":"Proceedings of the 4th International Conference on Computing, Communications and Security (ICCCS 2019)","doi":"10.1109/CCCS.2019.8888130","pages":"1–7","publisher":"IEEE","title":"Towards a fully automated and optimized network security functions orchestration","year":"2019","abstract":"Automated policy-based network security management tools represent a new research frontier to be fully explored, so as to reduce the number of human errors due to a manual and suboptimal configuration of security services. Moreover, the agility that an automated tool would require can be provided by the most recent networking technologies, Network Functions Virtualization and Software-Defined Networking, which move the network management from the hardware level to the software. However, even though a Security Automation approach is nowadays feasible and would bring several benefits in facing cybersecurity attacks, pending problems are that currently only a limited number of automatic management tools have been developed and that they do not have a direct integration with cloud orchestrators, consequently requiring human interaction. Given these considerations, in this paper we propose a novel framework, whose goal is to automatically and optimally allocate and conFigure security functions in a virtualized network service in a formal and verified way, directly integrated in cloud orchestrators. We validated this contribution through an implementation that is able to cooperate with two well-known orchestrators, that are Open Baton and Kubernetes. © 2019 IEEE.","keywords":"Security Orchestration","url":"https://iris.polito.it/retrieve/handle/11583/2753692/313520/main-2.pdf","bibtex":"@InProceedings{2019ICCCS,\r\n author = {Daniele Bringhenti and Guido Marchetto and Riccardo Sisto and Fulvio Valenza and Jalolliddin Yusupov},\r\n booktitle = {Proceedings of the 4th International Conference on Computing, Communications and Security ({ICCCS} 2019)},\r\n doi = {10.1109/CCCS.2019.8888130},\r\n pages = {1--7},\r\n publisher = {{IEEE}},\r\n title = {Towards a fully automated and optimized network security functions orchestration},\r\n year = {2019},\r\nabstract={Automated policy-based network security management tools represent a new research frontier to be fully explored, so as to reduce the number of human errors due to a manual and suboptimal configuration of security services. Moreover, the agility that an automated tool would require can be provided by the most recent networking technologies, Network Functions Virtualization and Software-Defined Networking, which move the network management from the hardware level to the software. However, even though a Security Automation approach is nowadays feasible and would bring several benefits in facing cybersecurity attacks, pending problems are that currently only a limited number of automatic management tools have been developed and that they do not have a direct integration with cloud orchestrators, consequently requiring human interaction. Given these considerations, in this paper we propose a novel framework, whose goal is to automatically and optimally allocate and conFigure security functions in a virtualized network service in a formal and verified way, directly integrated in cloud orchestrators. We validated this contribution through an implementation that is able to cooperate with two well-known orchestrators, that are Open Baton and Kubernetes. © 2019 IEEE.},\r\nkeywords={Security Orchestration},\r\nurl = {https://iris.polito.it/retrieve/handle/11583/2753692/313520/main-2.pdf},\r\n}\r\n\r\n","author_short":["Bringhenti, D.","Marchetto, G.","Sisto, R.","Valenza, F.","Yusupov, J."],"key":"2019ICCCS","id":"2019ICCCS","bibbaseid":"bringhenti-marchetto-sisto-valenza-yusupov-towardsafullyautomatedandoptimizednetworksecurityfunctionsorchestration-2019","role":"author","urls":{"Paper":"https://iris.polito.it/retrieve/handle/11583/2753692/313520/main-2.pdf"},"keyword":["Security Orchestration"],"metadata":{"authorlinks":{"valenza, f":"https://bibbase.org/show?bib=https%3A%2F%2Fraw.githubusercontent.com%2FFulvioValenza%2Fbibliography%2Fmain%2FValenza_bibliography.bib&commas=true","valenza, f":"https://bibbase.org/service/mendeley/47be63fe-fca0-3f0f-a864-642602926c3f"}},"downloads":5},"bibtype":"inproceedings","biburl":"https://raw.githubusercontent.com/FulvioValenza/bibliography/main/Valenza_bibliography.bib","creationDate":"2021-01-16T10:07:49.756Z","downloads":5,"keywords":["security orchestration"],"search_terms":["towards","fully","automated","optimized","network","security","functions","orchestration","bringhenti","marchetto","sisto","valenza","yusupov"],"title":"Towards a fully automated and optimized network security functions orchestration","year":2019,"dataSources":["JbiX35GNqPCF3nids","JotHtgcQ35FTMtuP5","oHcDH9GXBbkp4t9gm","csYhy47rJJgSM7jjJ","hZL94qE5m3pMWuJwA","8EGSmY4udryikjQyX","nMy6C9RcR4TJMDbmB","Ka2S54TRk8na4h8uK","qgD6ZecrgthN9jyS8","yf5ybPwJxfS5zDTx9","8iJ7pScsBCJNMEwBL","XZnEt8kdXurbtCWoc","R3zwdw7JArkWqNexb"]}