[{"date_updated":"2022-01-06T06:53:16Z","author":[{"first_name":"Ralph","full_name":"Koning, Ralph","last_name":"Koning"},{"last_name":"Polevoy","id":"83983","full_name":"Polevoy, Gleb","first_name":"Gleb"},{"last_name":"Meijer","full_name":"Meijer, Lydia","first_name":"Lydia"},{"first_name":"Cees","last_name":"de Laat","full_name":"de Laat, Cees"},{"full_name":"Grosso, Paola","last_name":"Grosso","first_name":"Paola"}],"main_file_link":[{"url":"https://ieeexplore.ieee.org/abstract/document/8854057/authors#authors"}],"conference":{"name":"2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)"},"doi":"10.1109/CSCloud/EdgeCom.2019.000-9","publication_identifier":{"issn":["null"]},"citation":{"short":"R. Koning, G. Polevoy, L. Meijer, C. de Laat, P. Grosso, in: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, pp. 113–123.","bibtex":"@inproceedings{Koning_Polevoy_Meijer_de Laat_Grosso_2019, series={2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)}, title={Approaches for Collaborative Security Defences in Multi Network Environments}, DOI={<a href=\"https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9\">10.1109/CSCloud/EdgeCom.2019.000-9</a>}, booktitle={2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)}, author={Koning, Ralph and Polevoy, Gleb and Meijer, Lydia and de Laat, Cees and Grosso, Paola}, year={2019}, pages={113–123}, collection={2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)} }","mla":"Koning, Ralph, et al. “Approaches for Collaborative Security Defences in Multi Network Environments.” <i>2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)</i>, 2019, pp. 113–23, doi:<a href=\"https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9\">10.1109/CSCloud/EdgeCom.2019.000-9</a>.","apa":"Koning, R., Polevoy, G., Meijer, L., de Laat, C., &#38; Grosso, P. (2019). Approaches for Collaborative Security Defences in Multi Network Environments. In <i>2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)</i> (pp. 113–123). <a href=\"https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9\">https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9</a>","chicago":"Koning, Ralph, Gleb Polevoy, Lydia Meijer, Cees de Laat, and Paola Grosso. “Approaches for Collaborative Security Defences in Multi Network Environments.” In <i>2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)</i>, 113–23. 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019. <a href=\"https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9\">https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9</a>.","ieee":"R. Koning, G. Polevoy, L. Meijer, C. de Laat, and P. Grosso, “Approaches for Collaborative Security Defences in Multi Network Environments,” in <i>2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)</i>, 2019, pp. 113–123.","ama":"Koning R, Polevoy G, Meijer L, de Laat C, Grosso P. Approaches for Collaborative Security Defences in Multi Network Environments. In: <i>2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)</i>. 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom). ; 2019:113-123. doi:<a href=\"https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9\">10.1109/CSCloud/EdgeCom.2019.000-9</a>"},"page":"113-123","_id":"17667","user_id":"83983","series_title":"2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)","department":[{"_id":"63"},{"_id":"541"}],"extern":"1","type":"conference","status":"public","date_created":"2020-08-06T15:23:23Z","title":"Approaches for Collaborative Security Defences in Multi Network Environments","quality_controlled":"1","year":"2019","keyword":["computer network security","multinetwork environments","multidomain defensive action","task execution order","timing influence defense efficiency","distributed attacks","collaborative security defence approach","minimize propagation approach","minimize countermeasure approach","counteract everywhere approach","Conferences","Cloud computing","Computer crime","Edge computing","Security","Defense Approaches","Multi-Domain Defense","Collaborative Defense","Defense Algorithms","Computer Networks"],"language":[{"iso":"eng"}],"publication":"2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)","abstract":[{"text":"Resolving distributed attacks benefits from collaboration between networks. We present three approaches for the same multi-domain defensive action that can be applied in such an alliance: 1) Counteract Everywhere, 2) Minimize Countermeasures, and 3) Minimize Propagation. First, we provide a formula to compute efficiency of a defense; then we use this formula to compute the efficiency of the approaches under various circumstances. Finally, we discuss how task execution order and timing influence defense efficiency. Our results show that the Minimize Propagation approach is the most efficient method when defending against the chosen attack.","lang":"eng"}]},{"user_id":"83983","department":[{"_id":"63"},{"_id":"541"}],"_id":"17666","language":[{"iso":"eng"}],"extern":"1","keyword":["Software defined networks","Network function virtualization","Cyber attacks","Cyber security","Defense efficiency","Overlay networks"],"type":"journal_article","publication":"Future Generation Computer Systems","status":"public","abstract":[{"lang":"eng","text":"Software Defined Networks (SDN) and Network Function Virtualisation (NFV) provide the basis for autonomous response and mitigation against attacks on networked computer infrastructures. We propose a new framework that uses SDNs and NFV to achieve this goal: Secure Autonomous Response Network (SARNET). In a SARNET, an agent running a control loop constantly assesses the security state of the network by means of observables. The agent reacts to and resolves security problems, while learning from its previous decisions. Two main metrics govern the decision process in a SARNET: impact and efficiency; these metrics can be used to compare and evaluate countermeasures and are the building blocks for self-learning SARNETs that exhibit autonomous response. In this paper we present the software implementation of the SARNET framework, evaluate it in a real-life network and discuss the tradeoffs between parameters used by the SARNET agent and the efficiency of its actions."}],"date_created":"2020-08-06T15:23:11Z","author":[{"first_name":"R.","full_name":"Koning, R.","last_name":"Koning"},{"last_name":"de Graaff","full_name":"de Graaff, B.","first_name":"B."},{"last_name":"Polevoy","id":"83983","full_name":"Polevoy, Gleb","first_name":"Gleb"},{"full_name":"Meijer, R.","last_name":"Meijer","first_name":"R."},{"first_name":"C.","full_name":"de Laat, C.","last_name":"de Laat"},{"first_name":"P.","full_name":"Grosso, P.","last_name":"Grosso"}],"date_updated":"2022-01-06T06:53:16Z","doi":"https://doi.org/10.1016/j.future.2018.08.011","title":"Measuring the efficiency of SDN mitigations against attacks on computer infrastructures","publication_identifier":{"issn":["0167-739X"]},"citation":{"ieee":"R. Koning, B. de Graaff, G. Polevoy, R. Meijer, C. de Laat, and P. Grosso, “Measuring the efficiency of SDN mitigations against attacks on computer infrastructures,” <i>Future Generation Computer Systems</i>, 2018.","chicago":"Koning, R., B. de Graaff, Gleb Polevoy, R. Meijer, C. de Laat, and P. Grosso. “Measuring the Efficiency of SDN Mitigations against Attacks on Computer Infrastructures.” <i>Future Generation Computer Systems</i>, 2018. <a href=\"https://doi.org/10.1016/j.future.2018.08.011\">https://doi.org/10.1016/j.future.2018.08.011</a>.","ama":"Koning R, de Graaff B, Polevoy G, Meijer R, de Laat C, Grosso P. Measuring the efficiency of SDN mitigations against attacks on computer infrastructures. <i>Future Generation Computer Systems</i>. 2018. doi:<a href=\"https://doi.org/10.1016/j.future.2018.08.011\">https://doi.org/10.1016/j.future.2018.08.011</a>","bibtex":"@article{Koning_de Graaff_Polevoy_Meijer_de Laat_Grosso_2018, title={Measuring the efficiency of SDN mitigations against attacks on computer infrastructures}, DOI={<a href=\"https://doi.org/10.1016/j.future.2018.08.011\">https://doi.org/10.1016/j.future.2018.08.011</a>}, journal={Future Generation Computer Systems}, author={Koning, R. and de Graaff, B. and Polevoy, Gleb and Meijer, R. and de Laat, C. and Grosso, P.}, year={2018} }","mla":"Koning, R., et al. “Measuring the Efficiency of SDN Mitigations against Attacks on Computer Infrastructures.” <i>Future Generation Computer Systems</i>, 2018, doi:<a href=\"https://doi.org/10.1016/j.future.2018.08.011\">https://doi.org/10.1016/j.future.2018.08.011</a>.","short":"R. Koning, B. de Graaff, G. Polevoy, R. Meijer, C. de Laat, P. Grosso, Future Generation Computer Systems (2018).","apa":"Koning, R., de Graaff, B., Polevoy, G., Meijer, R., de Laat, C., &#38; Grosso, P. (2018). Measuring the efficiency of SDN mitigations against attacks on computer infrastructures. <i>Future Generation Computer Systems</i>. <a href=\"https://doi.org/10.1016/j.future.2018.08.011\">https://doi.org/10.1016/j.future.2018.08.011</a>"},"year":"2018"}]
