A multi-vocal review of security orchestration
Organizations use diverse types of security solutions to prevent cyber-attacks. Multiple
vendors provide security solutions developed using heterogeneous technologies and …
vendors provide security solutions developed using heterogeneous technologies and …
[PDF][PDF] Poseidon: Mitigating volumetric ddos attacks with programmable switches
Distributed Denial-of-Service (DDoS) attacks have become a critical threat to the Internet.
Due to the increasing number of vulnerable Internet of Things (IoT) devices, attackers can …
Due to the increasing number of vulnerable Internet of Things (IoT) devices, attackers can …
Programmable {In-Network} security for context-aware {BYOD} policies
Bring Your Own Device (BYOD) has become the new norm for enterprise networks, but
BYOD security remains a top concern. Context-aware security, which enforces access …
BYOD security remains a top concern. Context-aware security, which enforces access …
Tennison: A distributed SDN framework for scalable network security
Despite the relative maturity of the Internet, the computer networks of today are still
susceptible to attack. The necessary distributed nature of networks for wide area connectivity …
susceptible to attack. The necessary distributed nature of networks for wide area connectivity …
Extended data plane architecture for in-network security services in software-defined networks
Abstract Software-Defined Networking (SDN)-based Network Function Virtualization (NFV)
technologies improve the dependability and resilience of networks by enabling …
technologies improve the dependability and resilience of networks by enabling …
vNIDS: Towards elastic security with safe and efficient virtualization of network intrusion detection systems
Traditional Network Intrusion Detection Systems (NIDSes) are generally implemented on
vendor proprietary appliances or middleboxes with poor versatility and flexibility. Emerging …
vendor proprietary appliances or middleboxes with poor versatility and flexibility. Emerging …
[PDF][PDF] Survey of cyber moving targets second edition
This survey provides an overview of different cyber moving-target techniques, their threat
models, and their technical details. A cyber moving-target technique refers to any technique …
models, and their technical details. A cyber moving-target technique refers to any technique …
Hierarchical anomaly-based detection of distributed DNS attacks on enterprise networks
Domain Name System (DNS) is a critical service for enterprise operations, and is often made
openly accessible across firewalls. Malicious actors use this fact to attack organizational …
openly accessible across firewalls. Malicious actors use this fact to attack organizational …
{Fine-Grained} isolation for scalable, dynamic, multi-tenant edge clouds
5G edge clouds promise a pervasive computational infrastructure a short network hop away,
enabling a new breed of smart devices that respond in real-time to their physical …
enabling a new breed of smart devices that respond in real-time to their physical …
ZTSFC: A Service Function Chaining-Enabled Zero Trust Architecture
Recently, zero trust security has received notable attention in the security community.
However, while many networks use monitoring and security functions like firewalls, their …
However, while many networks use monitoring and security functions like firewalls, their …