Reactive Security

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 135 Experts worldwide ranked by ideXlab platform

Frederica F Nelson - One of the best experts on this subject based on the ideXlab platform.

  • toward proactive adaptive defense a survey on moving target defense
    IEEE Communications Surveys and Tutorials, 2020
    Co-Authors: Jinhee Cho, Dilli P Sharma, Hooman Alavizadeh, Seunghyun Yoon, Noam Benasher, Terrence J Moore, Dong Seong Kim, Hyuk Lim, Frederica F Nelson
    Abstract:

    Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades. However, the nature of Reactive Security mechanisms has limitations because potential attackers cannot be prevented in advance. We are facing a reality with the proliferation of persistent, advanced, intelligent attacks while defenders are often way behind attackers in taking appropriate actions to thwart potential attackers. The concept of moving target defense (MTD) has emerged as a proactive defense mechanism aiming to prevent attacks. In this work, we conducted a comprehensive, in-depth survey to discuss the following aspects of MTD: key roles, design principles, classifications, common attacks, key methodologies, important algorithms, metrics, evaluation methods, and application domains. We discuss the pros and cons of all aspects of MTD surveyed in this work. Lastly, we highlight insights and lessons learned from this study and suggest future work directions. The aim of this paper is to provide the overall trends of MTD research in terms of critical aspects of defense systems for researchers who seek to develop proactive, adaptive MTD mechanisms.

Ioannis Askoxylakis - One of the best experts on this subject based on the ideXlab platform.

  • Reactive Security for sdn nfv enabled industrial networks leveraging service function chaining
    Transactions on Emerging Telecommunications Technologies, 2018
    Co-Authors: Ioannis Askoxylakis, Konstantinos Fysarakis, Nikolaos E. Petroulakis, George Spanoudakis
    Abstract:

    The innovative application of 5G core technologies, namely Software Defined Networking (SDN) and Network Function Virtualization (NFV), can help reduce capital and operational expenditures in industrial networks. Nevertheless, SDN expands the attack surface of the communication infrastructure, thus necessitating the introduction of additional Security mechanisms. These major changes could not leave the industrial environment unaffected, with smart industrial deployments gradually becoming a reality; a trend that is often referred to as the 4th industrial revolution or Industry 4.0. A wind park is a good example of an industrial application relying on a network with strict performance, Security, and reliability requirements, and was chosen as a representative example of industrial systems. This work highlights the benefit of leveraging the flexibility of SDN/NFV-enabled networks to deploy enhanced, Reactive Security mechanisms for the protection of the industrial network, via the use of Service Function Chaining. Moreover, the implementation of a proof-of-concept Reactive Security framework for an industrial-grade wind park network is presented, along with a performance evaluation of the proposed approach. The framework is equipped with SDN and Supervisory Control and Data Acquisition (SCADA) honeypots, modelled on and deployable to the wind park, allowing continuous monitoring of the industrial network and detailed analysis of potential attacks, thus isolating attackers and enabling the assessment of their level of sophistication. Moreover, the applicability of the proposed solutions is assessed in the context of the specific industrial application, based on the analysis of the network characteristics and requirements of an actual, operating wind park.

  • A Reactive Security Framework for operational wind parks using Service Function Chaining
    2017 IEEE Symposium on Computers and Communications (ISCC), 2017
    Co-Authors: Konstantinos Fysarakis, Khawar Abbasi, Petra Vizarreta, Ermin Sakic, Andreas Roos, George Petropoulos, Nikolaos E. Petroulakis, George Spanoudakis, Ioannis Askoxylakis
    Abstract:

    The innovative application of 5G core technologies, namely Software Defined Networking (SDN) and Network Function Virtualization (NFV), can help reduce capital and operational expenditures in industrial networks. Nevertheless, SDN expands the attack surface of the communication infrastructure, thus necessitating the introduction of additional Security mechanisms. A wind park is a good example of an industrial application relying on a network with strict performance, Security, and reliability requirements, and was chosen as a representative example of industrial systems. This work highlights the benefit of leveraging the flexibility of SDN/NFV-enabled networks to deploy enhanced, Reactive Security mechanisms for the protection of the industrial network, via the use of Service Function Chaining. Moreover, a proof of concept implementation of the Reactive Security framework for an industrial-grade wind park network is presented. The framework is equipped with SDN and Supervisory Control and Data Acquisition (SCADA) honeypots, modelled on (and deployable to) an actual, operating wind park, allowing continuous monitoring of the industrial network and detailed analysis of potential attacks, thus isolating attackers and enabling the assessment of their level of sophistication.

Jinhee Cho - One of the best experts on this subject based on the ideXlab platform.

  • toward proactive adaptive defense a survey on moving target defense
    IEEE Communications Surveys and Tutorials, 2020
    Co-Authors: Jinhee Cho, Dilli P Sharma, Hooman Alavizadeh, Seunghyun Yoon, Noam Benasher, Terrence J Moore, Dong Seong Kim, Hyuk Lim, Frederica F Nelson
    Abstract:

    Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades. However, the nature of Reactive Security mechanisms has limitations because potential attackers cannot be prevented in advance. We are facing a reality with the proliferation of persistent, advanced, intelligent attacks while defenders are often way behind attackers in taking appropriate actions to thwart potential attackers. The concept of moving target defense (MTD) has emerged as a proactive defense mechanism aiming to prevent attacks. In this work, we conducted a comprehensive, in-depth survey to discuss the following aspects of MTD: key roles, design principles, classifications, common attacks, key methodologies, important algorithms, metrics, evaluation methods, and application domains. We discuss the pros and cons of all aspects of MTD surveyed in this work. Lastly, we highlight insights and lessons learned from this study and suggest future work directions. The aim of this paper is to provide the overall trends of MTD research in terms of critical aspects of defense systems for researchers who seek to develop proactive, adaptive MTD mechanisms.

Konstantinos Fysarakis - One of the best experts on this subject based on the ideXlab platform.

  • Reactive Security for sdn nfv enabled industrial networks leveraging service function chaining
    Transactions on Emerging Telecommunications Technologies, 2018
    Co-Authors: Ioannis Askoxylakis, Konstantinos Fysarakis, Nikolaos E. Petroulakis, George Spanoudakis
    Abstract:

    The innovative application of 5G core technologies, namely Software Defined Networking (SDN) and Network Function Virtualization (NFV), can help reduce capital and operational expenditures in industrial networks. Nevertheless, SDN expands the attack surface of the communication infrastructure, thus necessitating the introduction of additional Security mechanisms. These major changes could not leave the industrial environment unaffected, with smart industrial deployments gradually becoming a reality; a trend that is often referred to as the 4th industrial revolution or Industry 4.0. A wind park is a good example of an industrial application relying on a network with strict performance, Security, and reliability requirements, and was chosen as a representative example of industrial systems. This work highlights the benefit of leveraging the flexibility of SDN/NFV-enabled networks to deploy enhanced, Reactive Security mechanisms for the protection of the industrial network, via the use of Service Function Chaining. Moreover, the implementation of a proof-of-concept Reactive Security framework for an industrial-grade wind park network is presented, along with a performance evaluation of the proposed approach. The framework is equipped with SDN and Supervisory Control and Data Acquisition (SCADA) honeypots, modelled on and deployable to the wind park, allowing continuous monitoring of the industrial network and detailed analysis of potential attacks, thus isolating attackers and enabling the assessment of their level of sophistication. Moreover, the applicability of the proposed solutions is assessed in the context of the specific industrial application, based on the analysis of the network characteristics and requirements of an actual, operating wind park.

  • A Reactive Security Framework for operational wind parks using Service Function Chaining
    2017 IEEE Symposium on Computers and Communications (ISCC), 2017
    Co-Authors: Konstantinos Fysarakis, Khawar Abbasi, Petra Vizarreta, Ermin Sakic, Andreas Roos, George Petropoulos, Nikolaos E. Petroulakis, George Spanoudakis, Ioannis Askoxylakis
    Abstract:

    The innovative application of 5G core technologies, namely Software Defined Networking (SDN) and Network Function Virtualization (NFV), can help reduce capital and operational expenditures in industrial networks. Nevertheless, SDN expands the attack surface of the communication infrastructure, thus necessitating the introduction of additional Security mechanisms. A wind park is a good example of an industrial application relying on a network with strict performance, Security, and reliability requirements, and was chosen as a representative example of industrial systems. This work highlights the benefit of leveraging the flexibility of SDN/NFV-enabled networks to deploy enhanced, Reactive Security mechanisms for the protection of the industrial network, via the use of Service Function Chaining. Moreover, a proof of concept implementation of the Reactive Security framework for an industrial-grade wind park network is presented. The framework is equipped with SDN and Supervisory Control and Data Acquisition (SCADA) honeypots, modelled on (and deployable to) an actual, operating wind park, allowing continuous monitoring of the industrial network and detailed analysis of potential attacks, thus isolating attackers and enabling the assessment of their level of sophistication.

Lazaros Iliadis - One of the best experts on this subject based on the ideXlab platform.

  • The Next Generation Cognitive Security Operations Center: Adaptive Analytic Lambda Architecture for Efficient Defense against Adversarial Attacks
    Big Data and Cognitive Computing, 2019
    Co-Authors: Konstantinos Demertzis, Panayiotis Kikiras, Salvador Llopis Sanchez, Nikos Tziritas, Lazaros Iliadis
    Abstract:

    A Security Operations Center (SOC) is a central technical level unit responsible for monitoring, analyzing, assessing, and defending an organization’s Security posture on an ongoing basis. The SOC staff works closely with incident response teams, Security analysts, network engineers and organization managers using sophisticated data processing technologies such as Security analytics, threat intelligence, and asset criticality to ensure Security issues are detected, analyzed and finally addressed quickly. Those techniques are part of a Reactive Security strategy because they rely on the human factor, experience and the judgment of Security experts, using supplementary technology to evaluate the risk impact and minimize the attack surface. This study suggests an active Security strategy that adopts a vigorous method including ingenuity, data analysis, processing and decision-making support to face various cyber hazards. Specifically, the paper introduces a novel intelligence driven cognitive computing SOC that is based exclusively on progressive fully automatic procedures. The proposed λ-Architecture Network Flow Forensics Framework (λ-ΝF3) is an efficient cyberSecurity defense framework against adversarial attacks. It implements the Lambda machine learning architecture that can analyze a mixture of batch and streaming data, using two accurate novel computational intelligence algorithms. Specifically, it uses an Extreme Learning Machine neural network with Gaussian Radial Basis Function kernel (ELM/GRBFk) for the batch data analysis and a Self-Adjusting Memory k-Nearest Neighbors classifier (SAM/k-NN) to examine patterns from real-time streams. It is a forensics tool for big data that can enhance the automate defense strategies of SOCs to effectively respond to the threats their environments face.