Today, Digital Service Providers (DSPs) increasingly use external services provided by third parties to create complex business chains, leveraging service-oriented architectures and everything-as-a-Service (XaaS) management paradigms. How- ever, the heterogeneity and dynamicity of such environments represents a challenge for DSPs. In particular, Digital Service Chaining (DSC) brings the risk to amplify the scope of cyber- threats and to elude local security controls.In this position paper, building on our past experience in dis- tributed monitoring and detection frameworks, we elaborate on the main challenges to investigate cyber-attacks in complex, het- erogeneous, multi-ownership, and interconnected systems. Our main contributions are the operational workflow and reference architecture for run-time protection of digital service chains, as well as the identification of the main issues and research directions that the networking and cybersecurity communities should jointly address.
Chaining Digital Services: Challenges to Investigate Cyber-Attacks at Run-Time
M Repetto
Primo
2024
Abstract
Today, Digital Service Providers (DSPs) increasingly use external services provided by third parties to create complex business chains, leveraging service-oriented architectures and everything-as-a-Service (XaaS) management paradigms. How- ever, the heterogeneity and dynamicity of such environments represents a challenge for DSPs. In particular, Digital Service Chaining (DSC) brings the risk to amplify the scope of cyber- threats and to elude local security controls.In this position paper, building on our past experience in dis- tributed monitoring and detection frameworks, we elaborate on the main challenges to investigate cyber-attacks in complex, het- erogeneous, multi-ownership, and interconnected systems. Our main contributions are the operational workflow and reference architecture for run-time protection of digital service chains, as well as the identification of the main issues and research directions that the networking and cybersecurity communities should jointly address.File | Dimensione | Formato | |
---|---|---|---|
Chaining_Digital_Services_Challenges_to_Investigate_Cyber-Attacks_at_Run-Time.pdf
accesso aperto
Descrizione: This work is licensed under the Creative Commons Attribution 4.0 license
Tipologia:
Versione Editoriale (PDF)
Licenza:
Creative commons
Dimensione
992.38 kB
Formato
Adobe PDF
|
992.38 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.