The growing trend towards network “softwarization” allows the creation and deployment of even complex network environments in a few minutes or seconds, rather than days or weeks as required by traditional methods. This revolutionary approach made it necessary to seek automatic processes to solve network security problems. One of the main issues in the automation of network security concerns the proper and efficient modeling of network traffic. In this paper, we describe two optimized Traffic Flows representation models, called Atomic Flows and Maximal Flows. In addition to the description, we have validated and evaluated the proposed models to solve two key network security problems - security verification and automatic configuration - showing the advantages and limitations of each solution.
Security Automation using Traffic Flow Modeling / Bussa, Simone; Sisto, Riccardo; Valenza, Fulvio. - (2022), pp. 486-491. (Intervento presentato al convegno IEEE 8th International Conference on Network Softwarization (NetSoft 2022 ) tenutosi a Milano) [10.1109/NetSoft54395.2022.9844025].
Security Automation using Traffic Flow Modeling
Bussa, Simone;Sisto, Riccardo;Valenza, Fulvio
2022
Abstract
The growing trend towards network “softwarization” allows the creation and deployment of even complex network environments in a few minutes or seconds, rather than days or weeks as required by traditional methods. This revolutionary approach made it necessary to seek automatic processes to solve network security problems. One of the main issues in the automation of network security concerns the proper and efficient modeling of network traffic. In this paper, we describe two optimized Traffic Flows representation models, called Atomic Flows and Maximal Flows. In addition to the description, we have validated and evaluated the proposed models to solve two key network security problems - security verification and automatic configuration - showing the advantages and limitations of each solution.File | Dimensione | Formato | |
---|---|---|---|
Security_Automation_using_Traffic_Flow_Modeling.pdf
non disponibili
Tipologia:
2a Post-print versione editoriale / Version of Record
Licenza:
Non Pubblico - Accesso privato/ristretto
Dimensione
905.14 kB
Formato
Adobe PDF
|
905.14 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
a80-bussa final.pdf
accesso aperto
Tipologia:
2. Post-print / Author's Accepted Manuscript
Licenza:
PUBBLICO - Tutti i diritti riservati
Dimensione
856.58 kB
Formato
Adobe PDF
|
856.58 kB | Adobe PDF | Visualizza/Apri |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2970468