Evolving business models, computing paradigms, and management practices are rapidly re-shaping the usage models of ICT infrastructures, and demanding for more flexibility and dynamicity in enterprise security, beyond the traditional “security perimeter” approach. Since valuable ICT assets cannot be easily enclosed within a trusted physical sandbox any more, there is an increasing need for a new generation of pervasive and capillary cyber- security paradigms over distributed and geographically-scattered systems. Following the generalized trend towards virtualization, automation, software-definition, and hardware/software disaggregation, in this paper we elaborate on a multi-tier architec- ture made of a common, programmable, and pervasive data-plane and a powerful set of multi-vendor detection and analysis algorithms. Our approach leverages the growing level of programmability of ICT infrastructures to create a common and unified framework that could be used to monitor and protect distributed heterogeneous environments, including legacy enterprise networks, IoT installations, and virtual resources deployed in the cloud.
|Data di pubblicazione:||2018|
|Titolo:||Static Analysis for GDPR Compliance|
|Titolo del libro:||Proceedings of the Second Italian Conference on Cyber Security (ITASEC 2018)|
|Appare nelle tipologie:||4.1 Articolo in Atti di convegno|
File in questo prodotto: