Today, Digital Service Providers (DSPs) increasingly use external services provided by third parties to create complex business chains, leveraging service-oriented architectures and everything-as-a-Service (XaaS) management paradigms. How- ever, the heterogeneity and dynamicity of such environments represents a challenge for DSPs. In particular, Digital Service Chaining (DSC) brings the risk to amplify the scope of cyber- threats and to elude local security controls. In this position paper, building on our past experience in dis- tributed monitoring and detection frameworks, we elaborate on the main challenges to investigate cyber-attacks in complex, het- erogeneous, multi-ownership, and interconnected systems. Our main contributions are the operational workflow and reference architecture for run-time protection of digital service chains, as well as the identification of the main issues and research directions that the networking and cybersecurity communities should jointly address.

Chaining Digital Services: Challenges to Investigate Cyber-Attacks at Run-Time

M Repetto
2023

Abstract

Today, Digital Service Providers (DSPs) increasingly use external services provided by third parties to create complex business chains, leveraging service-oriented architectures and everything-as-a-Service (XaaS) management paradigms. How- ever, the heterogeneity and dynamicity of such environments represents a challenge for DSPs. In particular, Digital Service Chaining (DSC) brings the risk to amplify the scope of cyber- threats and to elude local security controls. In this position paper, building on our past experience in dis- tributed monitoring and detection frameworks, we elaborate on the main challenges to investigate cyber-attacks in complex, het- erogeneous, multi-ownership, and interconnected systems. Our main contributions are the operational workflow and reference architecture for run-time protection of digital service chains, as well as the identification of the main issues and research directions that the networking and cybersecurity communities should jointly address.
2023
Istituto di Matematica Applicata e Tecnologie Informatiche - IMATI -
Cyber-threats propagation
Digital Service Chaining
Monitoring
detection
and response
Multi-stage and multi-vector attacks
File in questo prodotto:
File Dimensione Formato  
prod_486028-doc_201533.pdf

solo utenti autorizzati

Descrizione: Chaining Digital Services: Challenges to Investigate Cyber-Attacks at Run-Time
Tipologia: Documento in Pre-print
Dimensione 701 kB
Formato Adobe PDF
701 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/463438
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact