Automated Orchestration of Security Chains Driven by Process Learning - Archive ouverte HAL Access content directly
Book Sections Year : 2021

Automated Orchestration of Security Chains Driven by Process Learning

(1) , (1) , (1) , (2)
1
2

Abstract

Connected devices, such as smartphones and tablets, are exposed to a large variety of attacks. Their protection is often challenged by their resource constraints in terms of CPU, memory and energy. Security chains, composed of security functions such as firewalls, intrusion detection systems and data leakage prevention mechanisms, offer new perspectives to protect these devices using software-defined networking and network function virtualization. However, the complexity and dynamics of these chains require new automation techniques to orchestrate them. This chapter describes an automated orchestration methodology for security chains in order to secure connected devices and their applications. This methodology exploits process learning to establish behavioral models and infer security constraints represented as logical predicates. It then generates and merges a set of chains of security functions on the basis of these predicates. These chains are finally compiled into low-level configuration rules and deployed into the network, optimizing for the underlying topology. The benefits and limits of such a methodology combining machine learning and verification techniques are evaluated by a set of experimental results.
Not file

Dates and versions

hal-03518390 , version 1 (09-01-2022)

Identifiers

Cite

Nicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz. Automated Orchestration of Security Chains Driven by Process Learning. Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning, Wiley, 2021, 978-1-119-67550-1. ⟨10.1002/9781119675525.ch12⟩. ⟨hal-03518390⟩
22 View
0 Download

Altmetric

Share

Gmail Facebook Twitter LinkedIn More