131,336 research outputs found

    Security and Privacy Issues of Big Data

    Get PDF
    This chapter revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy. It is a pertinent aspect to be addressed because users share more and more personal data and content through their devices and computers to social networks and public clouds. So, a secure framework to social networks is a very hot topic research. This last topic is addressed in one of the two sections of the current chapter with case studies. In addition, the traditional mechanisms to support security such as firewalls and demilitarized zones are not suitable to be applied in computing systems to support Big Data. SDN is an emergent management solution that could become a convenient mechanism to implement security in Big Data systems, as we show through a second case study at the end of the chapter. This also discusses current relevant work and identifies open issues.Comment: In book Handbook of Research on Trends and Future Directions in Big Data and Web Intelligence, IGI Global, 201

    SDN Access Control for the Masses

    Full text link
    The evolution of Software-Defined Networking (SDN) has so far been predominantly geared towards defining and refining the abstractions on the forwarding and control planes. However, despite a maturing south-bound interface and a range of proposed network operating systems, the network management application layer is yet to be specified and standardized. It has currently poorly defined access control mechanisms that could be exposed to network applications. Available mechanisms allow only rudimentary control and lack procedures to partition resource access across multiple dimensions. We address this by extending the SDN north-bound interface to provide control over shared resources to key stakeholders of network infrastructure: network providers, operators and application developers. We introduce a taxonomy of SDN access models, describe a comprehensive design for SDN access control and implement the proposed solution as an extension of the ONOS network controller intent framework

    Applying Formal Methods to Networking: Theory, Techniques and Applications

    Full text link
    Despite its great importance, modern network infrastructure is remarkable for the lack of rigor in its engineering. The Internet which began as a research experiment was never designed to handle the users and applications it hosts today. The lack of formalization of the Internet architecture meant limited abstractions and modularity, especially for the control and management planes, thus requiring for every new need a new protocol built from scratch. This led to an unwieldy ossified Internet architecture resistant to any attempts at formal verification, and an Internet culture where expediency and pragmatism are favored over formal correctness. Fortunately, recent work in the space of clean slate Internet design---especially, the software defined networking (SDN) paradigm---offers the Internet community another chance to develop the right kind of architecture and abstractions. This has also led to a great resurgence in interest of applying formal methods to specification, verification, and synthesis of networking protocols and applications. In this paper, we present a self-contained tutorial of the formidable amount of work that has been done in formal methods, and present a survey of its applications to networking.Comment: 30 pages, submitted to IEEE Communications Surveys and Tutorial

    A reinforcement learning approach for attack graph analysis

    Get PDF

    Reconceptualizing major policy change in the advocacy coalition framework: a discourse network analysis of German pension politics

    Get PDF
    How does major policy change come about? This article identifies and rectifies weaknesses in the conceptualization of innovative policy change in the Advocacy Coalition Framework. In a case study of policy belief change preceding an innovative reform in the German subsystem of old-age security, important new aspects of major policy change are carved out. In particular, the analysis traces a transition from one single hegemonic advocacy coalition to another stable coalition, with a transition phase between the two equilibria. The transition phase is characterized (i) by a bipolarization of policy beliefs in the subsystem and (ii) by state actors with shifting coalition memberships due to policy learning across coalitions or due to executive turnover. Apparently, there are subsystems with specific characteristics (presumably redistributive rather than regulative subsystems) in which one hegemonic coalition is the default, or the "normal state." In these subsystems, polarization and shifting coalition memberships seem to interact to produce coalition turnover and major policy change. The case study is based on discourse network analysis, a combination of qualitative content analysis and social network analysis, which provides an intertemporal measurement of advocacy coalition realignment at the level of policy beliefs in a subsystem
    • …
    corecore