Abstract

Today, the digital economy is pushing new business models, based on the creation of value chains for data processing, through the interconnection of processes, products, services, software, and things across different domains and organizations. Despite the growing availability of communication infrastructures, computing paradigms, and software architectures that already effectively support the implementation of distributed multi-domain value chains, a comprehensive architecture is still missing that effectively fulfills all related security issues: mutual trustworthiness of entities in partially unknown topologies, identification and mitigation of advanced multi-vector threats, identity management and access control, management and propagation of sensitive data. In order to fill this gap, this work proposes a new methodological approach to design and implement heterogeneous security services for distributed systems that combine together digital resources and components from multiple domains. The framework is designed to support both existing and new security services, and focuses on three novel aspects: (i) full automation of the processes that manage the whole system, i.e., threat detection, collection of information and reaction to attacks and system anomalies; (ii) dynamic adaptation of operations and security tasks to newest attack patterns, and (iii) real-time adjustment of the level of detail of inspection and monitoring processes. The overall architecture as well as the functions and relationships of its logical components are described in detail, presenting also a concrete use case as an example of application of the proposed framework.

Highlights

  • The most remunerative business in the digital economy will be the creation of value chains for processing data, through the interconnection of processes, products, services, software, and things from multiple vendors on a growing scale

  • To overcome the issues described above, this paper proposes a new paradigm for managing cybersecurity in next-generation digital service chains

  • The modern technologies selected for this task are not resource-hungry, so resource allocation is not a problem, like explained in a preliminary study on this topic [34]. This kind of flexibility would allow more efficient allocation of resources, by dynamically adapting the processing load to the evolving context. Such approach is very useful whenever the detection is based on techniques which are largely based on the extraction and analysis of features that cannot be known in advance since attacks evolve and new threats emerge, effectively addressing the need to tackle the continuous evolution of attack patterns and to investigate or react to zero-day attacks

Read more

Summary

Introduction

The most remunerative business in the digital economy will be the creation of value chains for processing data, through the interconnection of processes, products, services, software, and things from multiple vendors on a growing scale. Page 3 of 34 37 proposed approach starts from the consideration that security functionalities must be embedded in every digital resource (e.g., cloud functions, networking services, databases, IoT), which give access to events and measurements for specific tenants Based on this assumption, a novel methodology is described to dynamically discover security properties and features embedded in each digital component, connect them to a broad set of detection and risk assessment algorithms, and automatically trigger mitigation and response actions by user-defined policies, removing the need for legacy cybersecurity appliances, and providing better support for deep and effective analysis of the security context and more automation in the overall process.

37 Page 4 of 34
The Shift Towards ‘as‐a‐service’ Models
Multi‐tenancy and Virtualization Issues
37 Page 6 of 34
From Infrastructure‐to Service‐centric Models
Challenges and Benefits for Distributed Cybersecurity Frameworks
37 Page 8 of 34
Integration with Management and Orchestration Tools
State of the Art on Cyber‐Security Frameworks
37 Page 10 of 34
The Proposed Architecture
Local Agents
Security Manager
Context Broker
37 Page 14 of 34
Context Programmer
Security Services
37 Page 18 of 34
Security Controller
37 Page 20 of 34
High‐Level Security Policies
37 Page 22 of 34
Identity Management and Access Control
Public Key Infrastructure
Idm Component
Situational Awareness
Reaction and Investigation
Cyber‐Threat Intelligence
Running Example
37 Page 26 of 34
Limitations and Challenges
37 Page 30 of 34
Conclusions
37 Page 32 of 34
37 Page 34 of 34
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call