Logo do repositório
 
Miniatura indisponível
Publicação

An automated closed-loop framework to enforce security policies from anomaly detection

Utilize este identificador para referenciar este registo.
Nome:Descrição:Tamanho:Formato: 
1-s2.0-S0167404822003418-main.pdf998.5 KBAdobe PDF Ver/Abrir

Orientador(es)

Resumo(s)

Due to the growing complexity and scale of IT systems, there is an increasing need to automate and streamline routine maintenance and security management procedures, to reduce costs and improve productivity. In the case of security incidents, the implementation and application of response actions require significant efforts from operators and developers in translating policies to code. Even if Machine Learning (ML) models are used to find anomalies, they need to be regularly trained/updated to avoid becoming outdated. In an evolving environment, a ML model with outdated training might put at risk the organization it was supposed to defend. To overcome those issues, in this paper we propose an automated closed-loop process with three stages. The first stage focuses on obtaining the Decision Trees (DT) that classify anomalies. In the second stage, DTs are translated into security Policies as Code based on languages recognized by the Policy Engine (PE). In the last stage, the translated security policies feed the Policy Engines that enforce them by converting them into specific instruction sets. We also demonstrate the feasibility of the proposed framework, by presenting an example that encompasses the three stages of the closed-loop process. The proposed framework may integrate a broad spectrum of domains and use cases, being able for instance to support the decide and the act stages of the ETSI Zero-touch Network & Service Management (ZSM) framework.

Descrição

Palavras-chave

Automation Policy as code Decision trees Machine learning Zero-touch network and service management (ZSM)

Contexto Educativo

Citação

Henriques, J., Caldeira, F., Cruz, T., & Simões, P. (2022). An automated closed-loop framework to enforce security policies from anomaly detection. Computers & Security, 123, 102949. https://doi.org/10.1016/j.cose.2022.102949

Projetos de investigação

Unidades organizacionais

Fascículo