Efficient middlebox scaling for virtualized intrusion prevention systems in software-defined networks

2021 ◽  
Vol 65 (8) ◽  
Author(s):  
Junchi Xing ◽  
Chunming Wu ◽  
Haifeng Zhou ◽  
Qiumei Cheng ◽  
Danrui Yu ◽  
...  
2018 ◽  
Vol 8 (12) ◽  
pp. 2460 ◽  
Author(s):  
Cyntia Vargas Martínez ◽  
Birgit Vogel-Heuser

System intrusions violate the security of a system. In order to maintain it, it is necessary to decrease the chances of intrusions occurring or by detecting them as soon as they ensue in order to respond to them in a timely manner. These responses are divided in two types: passive or reactive responses. Passive responses are limited to only notification and alerting; whereas, reactive responses influence the intrusion by undoing or diminishing its consequences. Unfortunately, some reactive responses may influence the underlying system where the intrusion has occurred. This is especially a concern in the field of Industrial Automation Systems, as these systems are critical and have a well-defined set of operational requirements that must be maintained. Hence, automatic reactive responses are often not considered or are limited to human intervention. This paper addresses this issue by introducing a concept for reactive protection that integrates the automatic execution of active responses that do not influence the operation of the underlying Industrial Automation System. This concept takes into consideration architectural and security trends, as well as security and operational policies of Industrial Automation Systems. It also proposes a set of reactive actions that can be taken in the presence of intrusions in order to counteract them or diminish their effects. The feasibility and applicability of the presented concept for Industrial Automation Systems is supported by the implementation and evaluation of a prototypical Reactive Protection System.


Author(s):  
Bijaya Kumar Panda ◽  
Manoranjan Pradhan ◽  
Sateesh Kumar Pradhan

In the last decade, there is a rapid growth in the use of Internet by the organization for information sharing. As information is very vital to the organizations, it should be preserved and insulated from any unauthorized access or alternation. In last few years, attacks on the computer infrastructures have increased exponentially. Several information security techniques are available now a days like firewalls, anti-virus software and Intrusion prevention systems (IPSs), which are important tools for protecting an organization from intrusions. Now most attacks are impossible to defend with firewalls and anti-virus software alone. Without an IPS, such attacks are difficult to detect and prevent. This chapter presents different definitions of intrusion prevention system with meaningful explanation; compare network IPS with Host IPS, common and the advanced detection methods, common IPS components, coverage of attacks by IPS and criteria to select right IPS. Finally, this chapter concludes with an analysis of the challenges that still remain to be resolved.


2017 ◽  
Vol 30 (16) ◽  
pp. e3339 ◽  
Author(s):  
Mikko Särelä ◽  
Tomi Kyöstilä ◽  
Timo Kiravuo ◽  
Jukka Manner

Sign in / Sign up

Export Citation Format

Share Document