PALANTIR: An NFV-Based Security-as-a-Service Approach for Automating Threat Mitigation

被引:4
|
作者
Compastie, Maxime [1 ]
Martinez, Antonio Lopez [2 ]
Fernandez, Carolina [1 ,3 ]
Perez, Manuel Gil [2 ]
Tsarsitalidis, Stylianos [4 ]
Xylouris, George [5 ]
Mlakar, Izidor [6 ,7 ]
Kourtis, Michail Alexandros [5 ]
Safran, Valentino [6 ]
机构
[1] i2CAT Fdn, Cybersecur Dept, Barcelona 08034, Spain
[2] Univ Murcia, Dept Informat & Commun Engn, Murcia 30100, Spain
[3] Univ Pompeu Fabra, Dept Informat & Commun Technol, Barcelona 08018, Spain
[4] UBITECH Ubiquitous Solut, Athens 15231, Greece
[5] ORION Innovat PC, Athens 11744, Greece
[6] Univ Maribor, Fac Elect Engn & Comp Sci, Maribor 2000, Slovenia
[7] Sfera IT Doo, Maribor 2000, Slovenia
关键词
Security-as-a-Service; security orchestration; policy-driven management; virtual network functions; finite state machines; constraints programming; ARCHITECTURE; NETWORKS;
D O I
10.3390/s23031658
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Small and medium enterprises are significantly hampered by cyber-threats as they have inherently limited skills and financial capacities to anticipate, prevent, and handle security incidents. The EU-funded PALANTIR project aims at facilitating the outsourcing of the security supervision to external providers to relieve SMEs/MEs from this burden. However, good practices for the operation of SME/ME assets involve avoiding their exposure to external parties, which requires a tightly defined and timely enforced security policy when resources span across the cloud continuum and need interactions. This paper proposes an innovative architecture extending Network Function Virtualisation to externalise and automate threat mitigation and remediation in cloud, edge, and on-premises environments. Our contributions include an ontology for the decision-making process, a Fault-and-Breach-Management-based remediation policy model, a framework conducting remediation actions, and a set of deployment models adapted to the constraints of cloud, edge, and on-premises environment(s). Finally, we also detail an implementation prototype of the framework serving as evaluation material.
引用
收藏
页数:37
相关论文
共 50 条
  • [31] Adaptive Network Security Service Orchestration Based on SDN/NFV
    Ganta, Priyatham
    Yu, Kicho
    Chintala, Dharma Dheeraj
    Park, Younghee
    INFORMATION SECURITY APPLICATIONS, 2021, 13009 : 231 - 242
  • [32] A Network Service Development Kit Supporting the End-to-End Lifecycle of NFV-based Telecom Services
    Van Rossem, Steven
    Peuster, Manuel
    Conceicao, Luis
    Kouchaksaraei, Hadi Razzaghi
    Tavernier, Wouter
    Colle, Didier
    Pickavet, Mario
    Demeester, Piet
    2017 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (NFV-SDN), 2017, : 190 - 191
  • [33] Toward High Available SDN/NFV-based Virtual Network Service in Multi-Providers Scenario
    Luo, Shibo
    Ota, Kaoru
    Dong, Mianxiong
    Wu, Jun
    Li, Jianhua
    Pei, Bei
    2016 WORLD AUTOMATION CONGRESS (WAC), 2016,
  • [34] SDN/NFV-based handover management approach for ultradense 5G mobile networks
    Gharsallah, Amina
    Zarai, Faouzi
    Neji, Mahmoud
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (17)
  • [35] Profit-Maximizing Service Function Chain Embedding in NFV-Based 5G Core Networks
    Chen, Zhenke
    Li, He
    Ota, Kaoru
    Dong, Mianxiong
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (06): : 6105 - 6117
  • [36] Investing in security-as-a-service for e-commerce infrastructure by small and medium enterprises: a Monte Carlo approach
    Nazareth D.L.
    Choi J.
    Ngo-Ye T.
    Journal of Systems and Information Technology, 2024, 26 (02) : 257 - 275
  • [37] Average Service Time Analysis of a Clustered VNF Chaining Scheme in NFV-based V2X Networks
    Han, Yan
    Tao, Xiaofeng
    Zhang, Xuefei
    Jia, Sijia
    IEEE ACCESS, 2018, 6 : 73232 - 73244
  • [38] A Novel Network Slicing based Security-as-a-Service (SECaaS) Framework for Private 5G Networks
    Wijethilaka, Shalitha
    Liyanage, Madhusanka
    2022 IEEE LATIN-AMERICAN CONFERENCE ON COMMUNICATIONS (LATINCOM), 2022,
  • [39] Leveraging Deep Learning for Enhanced Information Security: A Comprehensive Approach to Threat Detection and Mitigation
    Wang, Kaijing
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (12) : 964 - 972
  • [40] A threat model-based approach to security testing
    Marback, Aaron
    Do, Hyunsook
    He, Ke
    Kondamarri, Samuel
    Xu, Dianxiang
    SOFTWARE-PRACTICE & EXPERIENCE, 2013, 43 (02): : 241 - 258