Visible to the public An Intelligent Cyberspace Defense Architecture Based on Elastic Resource Infrastructure and Dynamic Container Orchestration

TitleAn Intelligent Cyberspace Defense Architecture Based on Elastic Resource Infrastructure and Dynamic Container Orchestration
Publication TypeConference Paper
Year of Publication2019
AuthorsChen, Jianfeng, Liu, Jie, Sun, Zhi, Li, Chunlin, Hu, Chunhui
Conference Name2019 International Conference on Networking and Network Applications (NaNA)
Keywordsaggregated security events, cloud computing, cloud computing platform, composability, Computer architecture, container library, containerization, containerization technology, Containers, Cyberspace, decision rule base, dynamic container orchestration, Dynamic decision making, Dynamic Networks and Security, Dynamical Systems, elastic resource infrastructure, Hardware, intelligent cyberspace defense architecture, intelligent defense, Metrics, Network Security Architecture, pubcrawl, Resiliency, resource allocation, security, security architecture, security capability pool, security decision center, security event database, security load, security of data, security payload, security resource allocation, Software, top-level security framework, unprecedented hard situation, versatile cyberspace
Abstract

The borderless, dynamic, high dimensional and virtual natures of cyberspace have brought unprecedented hard situation for defenders. To fight uncertain challenges in versatile cyberspace, a security framework based on the cloud computing platform that facilitates containerization technology to create a security capability pool to generate and distribute security payload according to system needs. Composed by four subsystems of the security decision center, the image and container library, the decision rule base and the security event database, this framework distills structured knowledge from aggregated security events and then deliver security load to the managed network or terminal nodes directed by the decision center. By introducing such unified and standardized top-level security framework that is decomposable, combinable and configurable in a service-oriented manner, it could offer flexibility and effectiveness in reconstructing security resource allocation and usage to reach higher efficiency.

DOI10.1109/NaNA.2019.00049
Citation Keychen_intelligent_2019