In recent years, virtualization paradigms have significantly increased the complexity of network infrastructures, making systematic risk assessment a central pillar for modern cybersecurity management. However, existing methodologies are largely static, do not adequately incorporate risk assessment, and fail to account for the strategic nature of modern adversaries. In this context, my doctoral research aims to advance network security by integrating risk assessment into two complementary fields: threat modeling and network security configuration. The primary advancement in threat modeling lies in integrating complex dynamic interactions between attackers and defenders through game-theoretic strategies to quantify risk in adversarial scenarios. Meanwhile, in network security configuration, the goal is to natively integrate these risk metrics into automated logic to optimize the deployment and reconfiguration of security functions. In this paper, I present the research questions and methodological directions that will guide my PhD activity in developing these integrated, risk-driven solution
Toward Risk-driven Cybersecurity Management for Virtual Networks / Coriale, Francesca; Bringhenti, Daniele; Valenza, Fulvio. - ELETTRONICO. - (In corso di stampa). ( 2026 IEEE 12th International Conference on Network Softwarization (NetSoft) Berlin (DE) 29 June - 3 July 2026).
Toward Risk-driven Cybersecurity Management for Virtual Networks
Francesca Coriale;Daniele Bringhenti;Fulvio Valenza
In corso di stampa
Abstract
In recent years, virtualization paradigms have significantly increased the complexity of network infrastructures, making systematic risk assessment a central pillar for modern cybersecurity management. However, existing methodologies are largely static, do not adequately incorporate risk assessment, and fail to account for the strategic nature of modern adversaries. In this context, my doctoral research aims to advance network security by integrating risk assessment into two complementary fields: threat modeling and network security configuration. The primary advancement in threat modeling lies in integrating complex dynamic interactions between attackers and defenders through game-theoretic strategies to quantify risk in adversarial scenarios. Meanwhile, in network security configuration, the goal is to natively integrate these risk metrics into automated logic to optimize the deployment and reconfiguration of security functions. In this paper, I present the research questions and methodological directions that will guide my PhD activity in developing these integrated, risk-driven solution| File | Dimensione | Formato | |
|---|---|---|---|
|
2026151640.pdf
accesso aperto
Tipologia:
2. Post-print / Author's Accepted Manuscript
Licenza:
Pubblico - Tutti i diritti riservati
Dimensione
154.26 kB
Formato
Adobe PDF
|
154.26 kB | Adobe PDF | Visualizza/Apri |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/3010389
