一个虚拟环境,用于制定现实的网络安全场景

A. Furfaro, A. Piccolo, D. Saccá, Andrea Parise
{"title":"一个虚拟环境,用于制定现实的网络安全场景","authors":"A. Furfaro, A. Piccolo, D. Saccá, Andrea Parise","doi":"10.1109/CLOUDTECH.2016.7847720","DOIUrl":null,"url":null,"abstract":"In the last few years, cyber security has become a hot topic because of the ever-increasing availability of Internet accessible services driven by the diffusion of connected devices. The consequent exposition to cyber threats demands for suitable methodologies, techniques and tools allowing to adequately handle issues arising in such a complex domain. We argue that the flexibility of virtual environments will play a critical role in many cyber security related aspects. Problems like the assessment of newly devised intrusion detection techniques, the evaluation of skills of cyber defense team members, the evaluation of the disruptive effects caused by the diffusion of new malware, are just few examples of issues that cannot be directly addressed in production systems even though they require realistic operating environments in order to be suitably performed. This paper describes the architecture of SMALLWORLD, a scalable software platform designed to reproduce realistic scenarios achieved by the immersion of real systems into a software defined virtual environment.","PeriodicalId":133495,"journal":{"name":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"A virtual environment for the enactment of realistic cyber security scenarios\",\"authors\":\"A. Furfaro, A. Piccolo, D. Saccá, Andrea Parise\",\"doi\":\"10.1109/CLOUDTECH.2016.7847720\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the last few years, cyber security has become a hot topic because of the ever-increasing availability of Internet accessible services driven by the diffusion of connected devices. The consequent exposition to cyber threats demands for suitable methodologies, techniques and tools allowing to adequately handle issues arising in such a complex domain. We argue that the flexibility of virtual environments will play a critical role in many cyber security related aspects. Problems like the assessment of newly devised intrusion detection techniques, the evaluation of skills of cyber defense team members, the evaluation of the disruptive effects caused by the diffusion of new malware, are just few examples of issues that cannot be directly addressed in production systems even though they require realistic operating environments in order to be suitably performed. This paper describes the architecture of SMALLWORLD, a scalable software platform designed to reproduce realistic scenarios achieved by the immersion of real systems into a software defined virtual environment.\",\"PeriodicalId\":133495,\"journal\":{\"name\":\"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CLOUDTECH.2016.7847720\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CLOUDTECH.2016.7847720","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

摘要

在过去的几年里,网络安全已经成为一个热门话题,因为连接设备的扩散推动了互联网可访问服务的不断增加。随之而来的对网络威胁的阐述需要合适的方法、技术和工具,以充分处理在如此复杂的领域中出现的问题。我们认为,虚拟环境的灵活性将在许多网络安全相关方面发挥关键作用。诸如评估新设计的入侵检测技术、评估网络防御团队成员的技能、评估新恶意软件扩散造成的破坏性影响等问题,只是无法在生产系统中直接解决的问题的几个例子,尽管它们需要现实的操作环境才能适当地执行。本文描述了SMALLWORLD的体系结构,SMALLWORLD是一个可扩展的软件平台,旨在通过将真实系统浸入到软件定义的虚拟环境中来重现现实场景。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A virtual environment for the enactment of realistic cyber security scenarios
In the last few years, cyber security has become a hot topic because of the ever-increasing availability of Internet accessible services driven by the diffusion of connected devices. The consequent exposition to cyber threats demands for suitable methodologies, techniques and tools allowing to adequately handle issues arising in such a complex domain. We argue that the flexibility of virtual environments will play a critical role in many cyber security related aspects. Problems like the assessment of newly devised intrusion detection techniques, the evaluation of skills of cyber defense team members, the evaluation of the disruptive effects caused by the diffusion of new malware, are just few examples of issues that cannot be directly addressed in production systems even though they require realistic operating environments in order to be suitably performed. This paper describes the architecture of SMALLWORLD, a scalable software platform designed to reproduce realistic scenarios achieved by the immersion of real systems into a software defined virtual environment.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
ECC certificate for authentication in cloud-based RFID Taking account of trust when adopting cloud computing architecture New technique for face recognition based on Singular Value Decomposition (SVD) A collaborative framework for intrusion detection (C-NIDS) in Cloud computing Cloud security and privacy model for providing secure cloud services
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1