A Programmable Threat Intelligence Framework for Containerized Clouds
Loading...

Date
2018
Authors
Cagatay Yucel
Ahmet Koltuksuz
Murat Odemis
Anas Mu'aza Kademi
Gokhan Ozbilgin
Journal Title
Journal ISSN
Volume Title
Publisher
ACAD CONFERENCES LTD
Open Access Color
OpenAIRE Downloads
OpenAIRE Views
Abstract
Contemporarily one of the main challenges for information security community is the growing number of cyber threats. Large scaled globally orchestrated and constantly evolving attacks are affecting our information systems and technologies every day. Therefore collection and the exchange of cyber threat intelligence is of supreme importance. The term Cyber Threat Intelligence (CTI) has emerged with the contemporary because of merging the cyber intelligence concepts with the risk and threat management in cyber space. Today a number of security companies provide cyber threat intelligence with their sensors deployed worldwide Security Information and Event Management (SIEM) software and Intrusion Detection and Prevention Systems (IDPS) working collaboratively. The collection of Cyber Threat Intelligence is the process of collecting and producing actionable information of threats and threat actors aimed at increasing awareness and operational capabilities upon recognition of attack and attempt scenarios in a timely fashion. This research aims to investigate the recent developments of SDN and Containerized Clouds with a security perspective. The implementation of a containerized cloud with a programmable network of honeypot is implemented in this research. The implementation is tested with a scenario where a propagation of a worm that is originated from an infected container image. The security mechanisms on the cloud are fed with the collected CTI and results of the experiments along with discussions are presented.
Description
Keywords
cyber threat intelligence, containerized clouds, cloud security, SDN, Cyber Threat Intelligence, Cloud Security, SDN, Containerized Clouds
Fields of Science
Citation
WoS Q
Scopus Q
Source
13th International Conference on Cyber Warfare and Security (ICCWS)
Volume
2018-March
Issue
Start Page
503
End Page
510
