Attack-aware Security Function Chain Reordering

05/17/2020
by   Lukas Iffländer, et al.
0

Attack-awareness recognizes self-awareness for security systems regarding the occurring attacks. More frequent and intense attacks on cloud and network infrastructures are pushing security systems to the limit. With the end of Moore's Law, merely scaling against these attacks is no longer economically justified. Previous works have already dealt with the adoption of Software-defined Networking and Network Function Virtualization in security systems and used both approaches to optimize performance by the intelligent placement of security functions. However, these works have not yet considered the sequence in which traffic passes through these functions. In this work, we make a case for the need to take this ordering into account by showing its impact. We then propose a reordering framework and analyze what aspects are necessary for modeling security service function chains and making decisions regarding the order based on those models. We show the impact of the order and validate our framework in an evaluation environment. The effect can extend to multiple orders of magnitude, and the framework's evaluation proves the feasibility of our concept.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/01/2020

A Taxonomy of Approaches for Integrating Attack Awareness in Applications

Software applications are subject to an increasing number of attacks, re...
research
08/07/2021

Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems

The core network architecture of telecommunication systems has undergone...
research
04/03/2020

Man in the middle and current injection attacks against the KLJN key exchanger compromised by DC sources

This study addresses a new question regarding the security of the Kirchh...
research
09/18/2023

Towards Model Co-evolution Across Self-Adaptation Steps for Combined Safety and Security Analysis

Self-adaptive systems offer several attack surfaces due to the communica...
research
04/24/2020

Introducing Virtual Security Functions into Latency-aware Placement for NFV Applications

The shift towards a completely virtualized networking environment is tri...
research
02/23/2020

Fighting Fire with Light: A Case for Defending DDoS Attacks Using the Optical Layer

The DDoS attack landscape is growing at an unprecedented pace. Inspired ...
research
01/11/2019

Don't Wait to be Breached! Creating Asymmetric Uncertainty of Cloud Applications via Moving Target Defenses

Cloud applications expose - besides service endpoints - also potential o...

Please sign up or login with your details

Forgot password? Click here to reset