Please use this identifier to cite or link to this item: http://hdl.handle.net/10773/41190
Full metadata record
DC FieldValueLanguage
dc.contributor.authorEscaleira, Pedropt_PT
dc.contributor.authorCunha, Vitorpt_PT
dc.contributor.authorGomes, Diogopt_PT
dc.contributor.authorBarraca, João P.pt_PT
dc.contributor.authorAguiar, Rui L.pt_PT
dc.date.accessioned2024-03-22T17:22:12Z-
dc.date.available2024-03-22T17:22:12Z-
dc.date.issued2023-12-
dc.identifier.issn2542-6605pt_PT
dc.identifier.urihttp://hdl.handle.net/10773/41190-
dc.description.abstractThe Internet of Things (IoT) paradigm has been one of the main contributors, in recent years, to the growth in the number of connected equipment. This fact has predominantly contributed to IoT being constrained by the 5th Generation Mobile Network (5G) progress and the promises this technology brings. However, this can be a double-edged sword. On the one hand, it will benefit from those progresses, but on the other, it will also be impacted by any security risk associated with 5G. One of the more serious security problems associated with it is the new wave of virtualization and softwarization of networks and analogous appliances, brought to light by paradigms such as Network Functions Virtualization (NFV) and Multi-access Edge Computing (MEC). Considering these predicaments, we propose a state-of-the-art Moving Target Defense (MTD) approach that defends Cloud-based Network Functions (CNFs) launched within MEC and NFV environments. Furthermore, our mechanism follows the famous Everything as a Service (XaaS) ideology, allowing any CNF provider to use this protection system, working agonistically. In the end, we created a Proof of Concept (PoC) of our proposed methodology, which we then used to conduct an extensive practical security analysis against the multiple phases of the Intrusion Kill Chain. Our final results have proven that our MTD as a Service (MTDaaS) approach can effectively delay and, in some cases, stop an attacker from achieving its objectives when trying to attack a CNF, even if the related vulnerability is a zero-day.pt_PT
dc.language.isoengpt_PT
dc.publisherElsevierpt_PT
dc.relationProject NETEDGE with Nr. 069977 (POCI-01-0247-FEDER-069977)pt_PT
dc.rightsopenAccesspt_PT
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/pt_PT
dc.subjectMoving Target Defense (MTD)pt_PT
dc.subjectMTD as a Service (MTDaaS)pt_PT
dc.subjectNetwork Functions Virtualization (NFV)pt_PT
dc.titleMoving Target Defense for the cloud/edge Telco environmentspt_PT
dc.typearticlept_PT
dc.description.versionpublishedpt_PT
dc.peerreviewedyespt_PT
degois.publication.titleInternet of Thingspt_PT
degois.publication.volume24pt_PT
dc.relation.publisherversionhttps://www.sciencedirect.com/science/article/pii/S2542660523002391pt_PT
dc.identifier.doi10.1016/j.iot.2023.100916pt_PT
dc.identifier.essn2542-6605pt_PT
dc.identifier.articlenumber100916pt_PT
Appears in Collections:DETI - Artigos
IT - Artigos

Files in This Item:
File Description SizeFormat 
1-s2.0-S2542660523002391-main.pdf2.31 MBAdobe PDFView/Open


FacebookTwitterLinkedIn
Formato BibTex MendeleyEndnote Degois 

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.