Automated Security Management for Virtual Services

被引:0
|
作者
Repetto, M. [1 ]
Carrega, A. [1 ]
Yusupov, J. [2 ]
Valenza, F. [2 ]
Risso, F. [2 ]
Lamanna, G. [3 ]
机构
[1] CNIT, S2N Lab, Genoa, Italy
[2] Politecn Torino, DAUIN, Turin, Italy
[3] Infocom Srl, Genoa, Italy
关键词
D O I
10.1109/nfv-sdn47374.2019.9040069
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The virtualization of applications and network functions facilitates the dynamic creation of compound services, automating both the provisioning of computing/networking/storage resources and their life-cycle management. Virtualization of security appliances is a common approach to protect such services, but can neither offer broad visibility across the whole deployed service nor implement coordinated and fine-grained enforcement actions. This paper proposes a novel security framework based on the integration of lightweight and programmable monitoring and enforcement hooks in each virtual function, which are collectively controlled by a common logic for prevention, detection, reaction, and mitigation of security threats. Our framework keeps direct control over the functionalities of the security hooks, and leverages standard orchestration tools for management actions on the service graph. It can be automatically instantiated by common orchestration operations. hence seamlessly integrating with the deployment process of service graphs.
引用
收藏
页数:2
相关论文
共 50 条
  • [31] IT security management for industrial plants - An automated support tool
    Palmin, Anna
    Runde, Stefan
    Kobes, Pierre
    ATP EDITION, 2012, (03): : 34 - 40
  • [32] WSSMT: Towards the Automated Analysis of Security-Sensitive Services and Applications
    Barletta, Michele
    Calvi, Alberto
    Ranise, Silvio
    Vigano, Luca
    Zanetti, Luca
    12TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2010), 2011, : 417 - 424
  • [33] A Virtual Testbed for Security Management of Industrial Control Systems
    Koganti, Venkata S.
    Ashrafuzzaman, Mohammad
    Jillepalli, Ananth A.
    Sheldon, Frederick T.
    PROCEEDINGS OF THE 2017 12TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), 2017, : 85 - 90
  • [34] Security and Trust Management for Virtual Organisations: GridTrust Approach
    Naqvi, Syed
    Mori, Paolo
    TRUST MANAGEMENT III, 2009, 300 : 306 - +
  • [35] Virtual routing and management algorithm for QoS and security in Internet
    Chong, I
    Jeong, SH
    Kahng, HK
    INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR BROADBAND AND MOBILE NETWORKS, 2004, 3090 : 451 - 461
  • [36] Efficient Security-Aware Virtual Memory Management
    Amirsoufi, Rahmatollah
    Taghiloo, Majid
    Ahmadi, Armin
    2009 INTERNATIONAL CONFERENCE OF SOFT COMPUTING AND PATTERN RECOGNITION, 2009, : 208 - +
  • [37] Centralized management of virtual security zones in IP networks
    Peltonen, A
    Virtanen, T
    Turtiainen, E
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 91 - 102
  • [38] Web services security for trustworthy business processing in dynamic virtual organisations
    Claessens, J
    Geuer-Pollmann, C
    EADOPTION AND THE KNOWLEDGE ECONOMY: ISSUES, APPLICATIONS, CASE STUDIES, PTS 1 AND 2, 2004, 1 : 1208 - 1215
  • [39] Trusted collaborative services for the IT security management of SMEs/mEs
    Ntouskas, Theodoros
    Papanikas, Dimitrios
    Polemi, Nineta
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (2-3) : 124 - 137
  • [40] Spatial data infrastructures for emergency services and security management
    Bill, R.
    INTEGRATION OF INFORMATION FOR ENVIRONMENTAL SECURITY, 2008, : 247 - 259