Title | Automatic Mapping of Cyber Security Requirements to Support Network Slicing in Software-Defined Networks |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Ehrlich, M., Wisniewski, L., Trsek, H., Mahrenholz, D., Jasperneite, J. |
Conference Name | 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA) |
Keywords | automatic mapping, Automation, composability, computer network management, computer network security, computer security, cyber security QoS requirements, cyber security requirements, dynamic networks, future network management paradigms, future-proof approach, future-proof network management, industrial automation domain, Industries, Metrics, network slicing, next generation network management, next generation networks, pubcrawl, quality of service, resilience, Resiliency, security, security related incidents, security related standards, social lives, software defined networking, Software-Defined Networks, Standards, ubiquitous computing, ubiquitous networks |
Abstract | The process of digitalisation has an advanced impact on social lives, state affairs, and the industrial automation domain. Ubiquitous networks and the increased requirements in terms of Quality of Service (QoS) create the demand for future-proof network management. Therefore, new technological approaches, such as Software-Defined Networks (SDN) or the 5G Network Slicing concept, are considered. However, the important topic of cyber security has mainly been ignored in the past. Recently, this topic has gained a lot of attention due to frequently reported security related incidents, such as industrial espionage, or production system manipulations. Hence, this work proposes a concept for adding cyber security requirements to future network management paradigms. For this purpose, various security related standards and guidelines are available. However, these approaches are mainly static, require a high amount of manual efforts by experts, and need to be performed in a steady manner. Therefore, the proposed solution contains a dynamic, machine-readable, automatic, continuous, and future-proof approach to model and describe cyber security QoS requirements for the next generation network management. |
DOI | 10.1109/ETFA.2017.8247728 |
Citation Key | ehrlich_automatic_2017 |