In recent years, virtualization paradigms have significantly increased the complexity of network infrastructures, making systematic risk assessment a central pillar for modern cybersecurity management. However, existing methodologies are largely static, do not adequately incorporate risk assessment, and fail to account for the strategic nature of modern adversaries. In this context, my doctoral research aims to advance network security by integrating risk assessment into two complementary fields: threat modeling and network security configuration. The primary advancement in threat modeling lies in integrating complex dynamic interactions between attackers and defenders through game-theoretic strategies to quantify risk in adversarial scenarios. Meanwhile, in network security configuration, the goal is to natively integrate these risk metrics into automated logic to optimize the deployment and reconfiguration of security functions. In this paper, I present the research questions and methodological directions that will guide my PhD activity in developing these integrated, risk-driven solution

Toward Risk-driven Cybersecurity Management for Virtual Networks / Coriale, Francesca; Bringhenti, Daniele; Valenza, Fulvio. - ELETTRONICO. - (In corso di stampa). ( 2026 IEEE 12th International Conference on Network Softwarization (NetSoft) Berlin (DE) 29 June - 3 July 2026).

Toward Risk-driven Cybersecurity Management for Virtual Networks

Francesca Coriale;Daniele Bringhenti;Fulvio Valenza
In corso di stampa

Abstract

In recent years, virtualization paradigms have significantly increased the complexity of network infrastructures, making systematic risk assessment a central pillar for modern cybersecurity management. However, existing methodologies are largely static, do not adequately incorporate risk assessment, and fail to account for the strategic nature of modern adversaries. In this context, my doctoral research aims to advance network security by integrating risk assessment into two complementary fields: threat modeling and network security configuration. The primary advancement in threat modeling lies in integrating complex dynamic interactions between attackers and defenders through game-theoretic strategies to quantify risk in adversarial scenarios. Meanwhile, in network security configuration, the goal is to natively integrate these risk metrics into automated logic to optimize the deployment and reconfiguration of security functions. In this paper, I present the research questions and methodological directions that will guide my PhD activity in developing these integrated, risk-driven solution
In corso di stampa
File in questo prodotto:
File Dimensione Formato  
2026151640.pdf

accesso aperto

Tipologia: 2. Post-print / Author's Accepted Manuscript
Licenza: Pubblico - Tutti i diritti riservati
Dimensione 154.26 kB
Formato Adobe PDF
154.26 kB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/3010389