Using Cyber Threat Intelligence to Prevent Malicious Known Traffic in a SDN Physical Testbed

09/05/2019
by   Jorge Buzzio García, et al.
0

Since the use of applications and communication tools has increased, one of the concerns of the responsible for network security has been to protect information and information systems, as well as to provide trust to end users for the use of information and communication technologies. Nowadays, attacks on the network have increased and undergone modifications, which make the task for traditional security devices difficult, being necessary to add the intelligence to face the new attacks generated in the network. Hence the need to incorporate Cyber Threat Intelligence (CTI) as a new component in the network. This work focuses on the use of information provided by a CTI to improve the security of Software Defined Networks (SDN), and at the same time, analyze how malicious traffic could be blocked in a physical testbed.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/10/2021

Cyber-Security Challenges in Aviation Industry: A Review of Current and Future Trends

The integration of Information and Communication Technology (ICT) tools ...
research
09/26/2019

Global Roaming Trust-based Model for V2X Communications

Smart cities need to connect physical devices as a network to improve th...
research
09/02/2022

Tweaking Metasploit to Evade Encrypted C2 Traffic Detection

Command and Control (C2) communication is a key component of any structu...
research
05/30/2019

SDN-based In-network Honeypot: Preemptively Disrupt and Mislead Attacks in IoT Networks

Detecting cyber attacks in the network environments used by Internet-of-...
research
10/04/2020

Federated TON_IoT Windows Datasets for Evaluating AI-based Security Applications

Existing cyber security solutions have been basically developed using kn...
research
09/15/2023

A Testbed for Automating and Analysing Mobile Devices and their Applications

The need for improved network situational awareness has been highlighted...
research
08/03/2018

Adaptive Traffic Fingerprinting for Darknet Threat Intelligence

Darknet technology such as Tor has been used by various threat actors fo...

Please sign up or login with your details

Forgot password? Click here to reset