Automated Orchestration of Security Chains Driven by Process Learning*

[1]  Aiko Pras,et al.  An Overview of IP Flow-Based Intrusion Detection , 2010, IEEE Communications Surveys & Tutorials.

[2]  Minlan Yu,et al.  SIMPLE-fying middlebox policy enforcement using SDN , 2013, SIGCOMM.

[3]  David Walker,et al.  Frenetic: a network programming language , 2011, ICFP.

[4]  Dominique Barthel,et al.  Routing Metrics Used for Path Calculation in Low-Power and Lossy Networks , 2012, RFC.

[5]  Mohamed Cheriet,et al.  Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns , 2019, IEEE Transactions on Services Computing.

[6]  Stephan Merz,et al.  Generation of SDN policies for protecting android environments based on automata learning , 2018, NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.

[7]  Brighten Godfrey,et al.  VeriFlow: verifying network-wide invariants in real time , 2012, HotSDN '12.

[8]  Gaetan Hurel,et al.  Behavioral and dynamic security functions chaining for Android devices , 2015, 2015 11th International Conference on Network and Service Management (CNSM).

[9]  Yuriy Brun,et al.  Synoptic: studying logged behavior with inferred models , 2011, ESEC/FSE '11.

[10]  Russell J. Clark,et al.  Kinetic: Verifiable Dynamic Network Control , 2015, NSDI.

[11]  Ning Kong,et al.  HTTP Usage in the Registration Data Access Protocol (RDAP) , 2015, RFC.

[12]  Ryan Beckett,et al.  Network Control Plane Synthesis and Verification , 2018 .

[13]  Nate Foster,et al.  Efficient synthesis of network updates , 2014, PLDI.

[14]  Hyunwoo Choi,et al.  Enabling Automatic Protocol Behavior Analysis for Android Applications , 2016, CoNEXT.

[15]  Gail-Joon Ahn,et al.  FLOWGUARD: building robust firewalls for software-defined networks , 2014, HotSDN.

[16]  Myung-Ki Shin,et al.  A Verification Method of SDN Firewall Applications , 2016, IEICE Trans. Commun..

[17]  Michael Schapira,et al.  VeriCon: towards verifying controller programs in software-defined networks , 2014, PLDI.

[18]  Erik Derr,et al.  On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis , 2016, USENIX Security Symposium.

[19]  Ioannis G. Askoxylakis,et al.  Reactive security for SDN/NFV‐enabled industrial networks leveraging service function chaining , 2018, Trans. Emerg. Telecommun. Technol..

[20]  Marco Roveri,et al.  The nuXmv Symbolic Model Checker , 2014, CAV.

[21]  M Handley,et al.  RFC 4732: Internet Denial-of-Service Considerations , 2006 .

[22]  Daniele Sgandurra,et al.  A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.

[23]  Olivier Festor,et al.  A platform for the analysis and visualization of network flow data of android environments , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

[24]  Sylvia Ratnasamy,et al.  BlindBox: Deep Packet Inspection over Encrypted Traffic , 2015, SIGCOMM.

[25]  Nick Feamster,et al.  The road to SDN: an intellectual history of programmable networks , 2014, CCRV.

[26]  VeriCon: towards verifying controller programs in software-defined networks , 2014, PLDI.

[27]  Michalis Faloutsos,et al.  ProfileDroid: multi-layer profiling of android applications , 2012, Mobicom '12.

[28]  Anna Sperotto,et al.  Flow-based intrusion detection , 2011, 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops.

[29]  Benoit Claise,et al.  Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information , 2008, RFC.

[30]  Muttukrishnan Rajarajan,et al.  Android Security: A Survey of Issues, Malware Penetration, and Defenses , 2015, IEEE Communications Surveys & Tutorials.

[31]  Stephan Merz,et al.  Automated Factorization of Security Chains in Software-Defined Networks , 2019, 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).

[32]  Gary Scott Malkin,et al.  Internet Users' Glossary , 1996, RFC.

[33]  Nicolas Schnepf,et al.  Orchestration et vérification de fonctions de sécurité pour des environnements intelligents. (Orchestration and verification of security functions for smart devices) , 2019 .

[34]  Yuriy Brun,et al.  Using Declarative Specification to Improve the Understanding, Extensibility, and Comparison of Model-Inference Algorithms , 2015, IEEE Transactions on Software Engineering.

[35]  Gaetan Hurel,et al.  Towards cloud-based compositions of security functions for mobile devices , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

[36]  Stephan Merz,et al.  Automated verification of security chains in software-defined networks with synaptic , 2017, 2017 IEEE Conference on Network Softwarization (NetSoft).

[37]  Jerome A. Feldman,et al.  On the Synthesis of Finite-State Machines from Samples of Their Behavior , 1972, IEEE Transactions on Computers.

[38]  Mark Handley,et al.  Internet Denial-of-Service Considerations , 2006, RFC.