2017
DOI: 10.1007/978-3-319-64653-4_8
|View full text |Cite
|
Sign up to set email alerts
|

SHIELD: Securing Against Intruders and Other Threats Through an NFV-Enabled Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…CyberKit4SME [7] enables risk monitoring and forecasting through a series of risk modelling tools, supporting regulatory compliance analysis, while SECONDO [8] targets the optimization of cybersecurity investments for SMEs. Other proposed methodologies (ANASTACIA [9], SHIELD [10]) exploit NFV for adaptive monitoring of IT infrastructure. Our project, combines most of the aforementioned approaches (NFV, machine learning, risk analysis, trust and attestation, threat sharing) offering a holistic protection for SMEs, acknowledging their lack of systematic approach for ensuring digital security.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…CyberKit4SME [7] enables risk monitoring and forecasting through a series of risk modelling tools, supporting regulatory compliance analysis, while SECONDO [8] targets the optimization of cybersecurity investments for SMEs. Other proposed methodologies (ANASTACIA [9], SHIELD [10]) exploit NFV for adaptive monitoring of IT infrastructure. Our project, combines most of the aforementioned approaches (NFV, machine learning, risk analysis, trust and attestation, threat sharing) offering a holistic protection for SMEs, acknowledging their lack of systematic approach for ensuring digital security.…”
Section: Related Workmentioning
confidence: 99%
“…c) Threat Intelligence (TI): The TI component complements the protection provided by the SecaaS Capabilities with advanced analytics mechanisms based on ML/Deep Learning (DL) techniques on different modalities of data from heterogeneous sources. By adopting a hybrid approach, analytics-based methods are combined with traditional signature-based IDSs to detect complex attacks [10]. TI communicates mainly with the deployed SecaaS and the SCO, creating a control loop.…”
Section: Palantir System Architecturementioning
confidence: 99%