A programmable threat intelligence framework for containerized clouds
Loading...

Date
2018
Authors
Cagatay Yucel
Ahmet Hasan Koltuksuz
Murat Odemis
Anas Maazu Kademi
İzzet Gökhan Özbilgin
Journal Title
Journal ISSN
Volume Title
Publisher
Academic Conferences and Publishing International Limited
Open Access Color
OpenAIRE Downloads
OpenAIRE Views
Abstract
Contemporarily one of the main challenges for information security community is the growing number of cyber threats. Large scaled globally orchestrated and constantly evolving attacks are affecting our information systems and technologies every day. Therefore collection and the exchange of cyber threat intelligence is of supreme importance. The term Cyber Threat Intelligence (CTI) has emerged with the contemporary because of merging the cyber intelligence concepts with the risk and threat management in cyber space. Today a number of security companies provide cyber threat intelligence with their sensors deployed worldwide Security Information and Event Management (SIEM) software and Intrusion Detection and Prevention Systems (IDPS) working collaboratively. The collection of Cyber Threat Intelligence is the process of collecting and producing actionable information of threats and threat actors aimed at increasing awareness and operational capabilities upon recognition of attack and attempt scenarios in a timely fashion. This research aims to investigate the recent developments of SDN and Containerized Clouds with a security perspective. The implementation of a containerized cloud with a programmable network of honeypot is implemented in this research. The implementation is tested with a scenario where a propagation of a worm that is originated from an infected container image. The security mechanisms on the cloud are fed with the collected CTI and results of the experiments along with discussions are presented. © 2018 Elsevier B.V. All rights reserved.
Description
Keywords
Cloud Security, Containerized Clouds, Cyber Threat Intelligence, Sdn, Computer Crime, Containers, Intrusion Detection, Network Security, Cloud Securities, Cyber Threats, Information Systems And Technologies, Intrusion Detection And Prevention Systems, Operational Capabilities, Programmable Network, Security Information And Event Management (siem), Security Mechanism, Information Management, Computer crime, Containers, Intrusion detection, Network security, Cloud securities, Cyber threats, Information systems and technologies, Intrusion detection and prevention systems, Operational capabilities, Programmable network, Security information and event management (SIEM), Security mechanism, Information management
Fields of Science
Citation
WoS Q
Scopus Q
Source
13th International Conference on Cyber Warfare and Security ICCWS 2018
