A multi-vocal review of security orchestration

C Islam, MA Babar, S Nepal - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Organizations use diverse types of security solutions to prevent cyber-attacks. Multiple
vendors provide security solutions developed using heterogeneous technologies and …

[PDF][PDF] Poseidon: Mitigating volumetric ddos attacks with programmable switches

M Zhang, G Li, S Wang, C Liu, A Chen, H Hu… - the 27th Network and …, 2020 - par.nsf.gov
Distributed Denial-of-Service (DDoS) attacks have become a critical threat to the Internet.
Due to the increasing number of vulnerable Internet of Things (IoT) devices, attackers can …

Programmable {In-Network} security for context-aware {BYOD} policies

Q Kang, L Xue, A Morrison, Y Tang, A Chen… - 29th USENIX Security …, 2020 - usenix.org
Bring Your Own Device (BYOD) has become the new norm for enterprise networks, but
BYOD security remains a top concern. Context-aware security, which enforces access …

Tennison: A distributed SDN framework for scalable network security

L Fawcett, S Scott-Hayward… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
Despite the relative maturity of the Internet, the computer networks of today are still
susceptible to attack. The necessary distributed nature of networks for wide area connectivity …

Extended data plane architecture for in-network security services in software-defined networks

J Kim, Y Kim, V Yegneswaran, P Porras, S Shin… - Computers & …, 2023 - Elsevier
Abstract Software-Defined Networking (SDN)-based Network Function Virtualization (NFV)
technologies improve the dependability and resilience of networks by enabling …

vNIDS: Towards elastic security with safe and efficient virtualization of network intrusion detection systems

H Li, H Hu, G Gu, GJ Ahn, F Zhang - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Traditional Network Intrusion Detection Systems (NIDSes) are generally implemented on
vendor proprietary appliances or middleboxes with poor versatility and flexibility. Emerging …

[PDF][PDF] Survey of cyber moving targets second edition

BC Ward, SR Gomez, R Skowyra, D Bigelow… - MIT Lincoln Laboratory …, 2018 - mit.edu
This survey provides an overview of different cyber moving-target techniques, their threat
models, and their technical details. A cyber moving-target technique refers to any technique …

Hierarchical anomaly-based detection of distributed DNS attacks on enterprise networks

M Lyu, HH Gharakheili, C Russell… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Domain Name System (DNS) is a critical service for enterprise operations, and is often made
openly accessible across firewalls. Malicious actors use this fact to attack organizational …

{Fine-Grained} isolation for scalable, dynamic, multi-tenant edge clouds

Y Ren, G Liu, V Nitu, W Shao, R Kennedy… - 2020 USENIX Annual …, 2020 - usenix.org
5G edge clouds promise a pervasive computational infrastructure a short network hop away,
enabling a new breed of smart devices that respond in real-time to their physical …

ZTSFC: A Service Function Chaining-Enabled Zero Trust Architecture

L Bradatsch, O Miroshkin, F Kargl - IEEE Access, 2023 - ieeexplore.ieee.org
Recently, zero trust security has received notable attention in the security community.
However, while many networks use monitoring and security functions like firewalls, their …