2016
DOI: 10.1109/cc.2016.7405735
|View full text |Cite
|
Sign up to set email alerts
|

SDSA: A framework of a software-defined security architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…In [42], an intelligent honeynet architecture based on the SDS framework [43] is proposed, enabling flexible deployment and dynamic provisioning over Network Function Virtualization Infrastructure (NFVI). This paper focuses on migrating resources according to the workloads of each honeypot and power off unused modules, which is a kind of countermeasure that increases the cost-efficiency of the honeypot resource.…”
Section: B Sdn-enabled Honeypot Architecturesmentioning
confidence: 99%
“…In [42], an intelligent honeynet architecture based on the SDS framework [43] is proposed, enabling flexible deployment and dynamic provisioning over Network Function Virtualization Infrastructure (NFVI). This paper focuses on migrating resources according to the workloads of each honeypot and power off unused modules, which is a kind of countermeasure that increases the cost-efficiency of the honeypot resource.…”
Section: B Sdn-enabled Honeypot Architecturesmentioning
confidence: 99%
“…Basically, the orchestrator takes inputs from the mitigation module and, under the supervision of the operator, applies the best security reaction strategy on the telecommunication network implementing a Software Defined Security (SDS) approach as shown in Figure 3. As introduced in [31], SDS is a framework mimicking the SDN approach that has been successfully being applied for managing communications networks. The main goal of SDS is the decoupling of the control and the operation part of a security system by 23 exploiting virtualization of security techniques.…”
Section: Orchestratormentioning
confidence: 99%
“…IDSs are able to distinguish between legal as well as illegal behavior based on normal behavior, patterns of good traffic, or specific regulations that define an attack. Data mining, which is used to explain knowledge discovery, may assist in the development and deployment of IDSs with greater accuracy and more resilient behavior as opposed to existing IDSs [7].…”
Section: Introductionmentioning
confidence: 99%