Affiliation:
1. Department of Computer Science and Engineering (DISI), Alma Mater Studiorum— Università di Bologna, 40136 Bologna, Italy
Abstract
The correct and efficient measurement of security properties is key to the deployment of effective cyberspace protection strategies. In this work, we propose GRAPH4, which is a system that combines different security metrics to design an attack detection approach that leverages the advantages of modern network architectures. GRAPH4 makes use of attack graphs that are generated by the control plane to extract a view of the network components requiring monitoring, which is based on the specific attack that must be detected and on the knowledge of the complete network layout. It enables an efficient distribution of security metrics tasks between the control plane and the data plane. The attack graph is translated into network rules that are subsequently installed in programmable nodes in order to enable alerting and detecting network anomalies at a line rate. By leveraging data plane programmability and security metric scores, GRAPH4 enables timely responses to unforeseen conditions while optimizing resource allocation and enhancing proactive defense. This paper details the architecture of GRAPH4, and it provides an evaluation of the performance gains it can achieve.
Subject
Computer Networks and Communications
Reference37 articles.
1. A survey of network anomaly detection techniques;Ahmed;J. Netw. Comput. Appl.,2016
2. Gori, G., Melis, A., Berardi, D., Prandini, M., Al Sadi, A., and Callegati, F. (2023, January 8–11). Towards the Creation of Interdisciplinary Consumer-Oriented Security Metrics. Proceedings of the 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA.
3. Gori, G., Melis, A., Rinieri, L., Prandini, M., Al Sadi, A., and Callegati, F. (2022, January 19–22). Metrics for Cyber-Physical Security: A call to action. Proceedings of the 2022 International Symposium on Networks, Computers and Communications (ISNCC), Shenzhen, China.
4. P-scor: Integration of constraint programming orchestration and programmable data plane;Melis;IEEE Trans. Netw. Serv. Manag.,2020
5. A survey on systems security metrics;Pendleton;ACM Comput. Surv. CSUR,2016
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献