1,434 research outputs found
View on 5G Architecture: Version 2.0
The 5G Architecture Working Group as part of the 5GPPP Initiative is looking at capturing novel trends and key technological enablers for the realization of the 5G architecture. It also targets at presenting in a harmonized way the architectural concepts developed in various projects and initiatives (not limited to 5GPPP projects only) so as to provide a consolidated view on the technical directions for the architecture design in the 5G era. The first version of the white paper was released in July 2016, which captured novel trends and key technological enablers for the realization of the 5G architecture vision along with harmonized architectural concepts from 5GPPP Phase 1 projects and initiatives. Capitalizing on the architectural vision and framework set by the first version of the white paper, this Version 2.0 of the white paper presents the latest findings and analyses with a particular focus on the concept evaluations, and accordingly it presents the consolidated overall architecture design
The future of Cybersecurity in Italy: Strategic focus area
This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management
Network Security Intelligence Centres for Information Security Incident Management
Programme: 6598 - Ph.D. on the Basis of Prior Published Works in Cyber SecurityIntensive IT development has led to qualitative changes in our living, which are driving current information security (IS) trends and require sophisticated structures and adequate approached to manage IS for different businesses. The wide range of threats is constantly growing in modern intranets; they have become not only numerous and diverse but more disruptive. In such circumstances, organizations realize that IS incidentsâ timely detection and prevention in the future (what is more important) are not only possible but imperative. Any delay and only reactive actions to IS incidents put their assets under risk. A properly designed IS incident management system (ISIMS), operating as an integral part of the whole organizationâs governance system, reduces IS incidentsâ number and limits damage caused by them. To maximally automate IS incident management (ISIM) within one organization and to deepen its knowledge of IS level, this research proposes to unite together all advantages of a Security Intelligence Centre (SIC) and a Network Operations Centre (NOC) with their unique and joint toolkits and techniques in a unified Network SIC (NSIC). For this purpose the glossary of the research area was introduced, the taxonomy of IS threats, vulnerabilities, network attacks, and incidents was determined. Further, IS monitoring as one of the ISIM processes was described, the Security Information and Event Management (SIEM) systemsâ role in it and their evolution were shown. The transition from Security Operations Centres (SOCs) to SICs was followed up. At least, modern network environmentâs requirements for new protection solutions were formulated and it was proven that the NSIC proposed as a combination of a SIC and a NOC fully meets them. The NSICâs zone security infrastructure with corresponding IS controls is proposed. Its implementation description at the Moscow Engineering Physics Institute concludes the research at this stage. In addition, some proposals for the training of highly qualified personnel for NSICs were formulated. The creation of an innovative NSIC concept, its interpretation, construction and initial implementation through original research presented are its main results. They contribute substantially to the modern networksâ security, as they extend the forefront of the SOCs and SICc used nowadays and generate significant new knowledge and understanding of network security requirements and solutions
Recommended from our members
The influence of standardisation and regulation on the development of intelligent networks
In todayâs global economy a flexible and responsive telecommunications infrastructure is essential to the maintenance and development of a countryâs economy. Within a free market, such an infrastructure depends upon the use of common standards; either imposed as a consequence of regulation or evolved through the operation of the market. This thesis investigates the influence of regulation and standardisation on Intelligent Network telecommunications technology by addressing the hypothesis: Tight architecture-based regulation is inappropriate for a rapidly changing telecommunications environment, since that environment is continually challenging and redefining the boundaries of technological change. The multi-method approach adopted is based upon triangulation to identify multiple viewpoints. A Stakeholder Analysis was employed to help categorise those with an interest in Intelligent Networks and provide a basis for data collection. The primary data was gathered using a combination of surveys and interviews. The thesis illustrates a wide range of original research. A unique analysis framework was constructed to identify a number of factors, including technical and commercial influences and their impact on the choice of IN architecture and the implementation of regulations. This framework offers a new perspective with which to view IN architectures; leading to the development and implementation of alternative IN architecture models. A number of these architectures have been constructed, together with some novel services, to demonstrate what could be achieved by employing flexible, less detailed standards, or making use of proprietary protocols. The research concludes that tight regulation is not appropriate for Intelligent Network technology. Instead, encouragement for implementation and interconnection is better shaped through the development and adoption of de-jure standards
- âŠ