Today, Digital Service Providers (DSPs) increasingly use external services provided by third parties to create complex business chains, leveraging service-oriented architectures and everything-as-a-Service (XaaS) management paradigms. How- ever, the heterogeneity and dynamicity of such environments represents a challenge for DSPs. In particular, Digital Service Chaining (DSC) brings the risk to amplify the scope of cyber- threats and to elude local security controls. In this position paper, building on our past experience in dis- tributed monitoring and detection frameworks, we elaborate on the main challenges to investigate cyber-attacks in complex, het- erogeneous, multi-ownership, and interconnected systems. Our main contributions are the operational workflow and reference architecture for run-time protection of digital service chains, as well as the identification of the main issues and research directions that the networking and cybersecurity communities should jointly address.

Chaining Digital Services: Challenges to Investigate Cyber-Attacks at Run-Time

M Repetto
2023

Abstract

Today, Digital Service Providers (DSPs) increasingly use external services provided by third parties to create complex business chains, leveraging service-oriented architectures and everything-as-a-Service (XaaS) management paradigms. How- ever, the heterogeneity and dynamicity of such environments represents a challenge for DSPs. In particular, Digital Service Chaining (DSC) brings the risk to amplify the scope of cyber- threats and to elude local security controls. In this position paper, building on our past experience in dis- tributed monitoring and detection frameworks, we elaborate on the main challenges to investigate cyber-attacks in complex, het- erogeneous, multi-ownership, and interconnected systems. Our main contributions are the operational workflow and reference architecture for run-time protection of digital service chains, as well as the identification of the main issues and research directions that the networking and cybersecurity communities should jointly address.
2023
Istituto di Matematica Applicata e Tecnologie Informatiche - IMATI -
Cyber-threats propagation
Digital Service Chaining
Monitoring
detection
and response
Multi-stage and multi-vector attacks
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/463438
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact