The growing trend towards network “softwarization” allows the creation and deployment of even complex network environments in a few minutes or seconds, rather than days or weeks as required by traditional methods. This revolutionary approach made it necessary to seek automatic processes to solve network security problems. One of the main issues in the automation of network security concerns the proper and efficient modeling of network traffic. In this paper, we describe two optimized Traffic Flows representation models, called Atomic Flows and Maximal Flows. In addition to the description, we have validated and evaluated the proposed models to solve two key network security problems - security verification and automatic configuration - showing the advantages and limitations of each solution.

Security Automation using Traffic Flow Modeling / Bussa, Simone; Sisto, Riccardo; Valenza, Fulvio. - (2022), pp. 486-491. (Intervento presentato al convegno IEEE 8th International Conference on Network Softwarization (NetSoft 2022 ) tenutosi a Milano) [10.1109/NetSoft54395.2022.9844025].

Security Automation using Traffic Flow Modeling

Bussa, Simone;Sisto, Riccardo;Valenza, Fulvio
2022

Abstract

The growing trend towards network “softwarization” allows the creation and deployment of even complex network environments in a few minutes or seconds, rather than days or weeks as required by traditional methods. This revolutionary approach made it necessary to seek automatic processes to solve network security problems. One of the main issues in the automation of network security concerns the proper and efficient modeling of network traffic. In this paper, we describe two optimized Traffic Flows representation models, called Atomic Flows and Maximal Flows. In addition to the description, we have validated and evaluated the proposed models to solve two key network security problems - security verification and automatic configuration - showing the advantages and limitations of each solution.
2022
978-1-6654-0694-9
File in questo prodotto:
File Dimensione Formato  
Security_Automation_using_Traffic_Flow_Modeling.pdf

non disponibili

Tipologia: 2a Post-print versione editoriale / Version of Record
Licenza: Non Pubblico - Accesso privato/ristretto
Dimensione 905.14 kB
Formato Adobe PDF
905.14 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
a80-bussa final.pdf

accesso aperto

Tipologia: 2. Post-print / Author's Accepted Manuscript
Licenza: PUBBLICO - Tutti i diritti riservati
Dimensione 856.58 kB
Formato Adobe PDF
856.58 kB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/2970468