Computer networks security is a hard issue, which continuously evolves due to the change of technologies, architectures and algorithms and the growing complexity of architectures and systems. This question is enforced in distributed contexts where the lack of a central authority imposes to set up a proper strategy for both passive and active security. Moreover, it is also essential to test the strategy under as many attack scenarios as possible, to discover and tackle unforeseen situations; this cannot be easily performed on the real system without avoiding either security risks (when it is running) or high costs (if the system must be disconnected from the network during tests). A viable solution is represented by the use of virtualization technologies. Leveraging virtualization permits us to set up an effective and efficient real network duplicate, which can be used for the assessment of security in a non-trivial, risk-free and costs saving fashion.

Virtualization for effective risk-free network security assessment

Carchiolo, V.;Longheu, A.;Malgeri, M.;Mangioni, G.
2014

Abstract

Computer networks security is a hard issue, which continuously evolves due to the change of technologies, architectures and algorithms and the growing complexity of architectures and systems. This question is enforced in distributed contexts where the lack of a central authority imposes to set up a proper strategy for both passive and active security. Moreover, it is also essential to test the strategy under as many attack scenarios as possible, to discover and tackle unforeseen situations; this cannot be easily performed on the real system without avoiding either security risks (when it is running) or high costs (if the system must be disconnected from the network during tests). A viable solution is represented by the use of virtualization technologies. Leveraging virtualization permits us to set up an effective and efficient real network duplicate, which can be used for the assessment of security in a non-trivial, risk-free and costs saving fashion.
Distributed systems; IT Security; Virtualization; Computer Science Applications1707 Computer Vision and Pattern Recognition; Computer Networks and Communications
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.11769/362099
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact